Author of the publication

Lumus: Dynamically Uncovering Evasive Android Applications.

, , , , , and . ISC, volume 11060 of Lecture Notes in Computer Science, page 47-66. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Android malware using dynamically obtained features., , , , and . J. Computer Virology and Hacking Techniques, 11 (1): 9-17 (2015)A methodology for management of cloud computing using security criteria., , and . LatinCloud, page 49-54. IEEE, (2012)Return on security investment for cloud computing: a customer perspective., and . MEDES, page 156-160. ACM, (2015)"VANILLA" malware: vanishing antiviruses by interleaving layers and layers of attacks., , and . J. Computer Virology and Hacking Techniques, 15 (4): 233-247 (2019)AntiViruses under the microscope: A hands-on perspective., , , , , , and . Comput. Secur., (2022)Policy Modeling and Refinement for Network Security Systems., , and . POLICY, page 24-33. IEEE Computer Society, (2005)A hybrid framework to analyze web and OS malware., , , , and . ICC, page 966-970. IEEE, (2012)Tracking Memory Writes for Malware Classification and Code Reuse Identification., , , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 134-143. Springer, (2012)Analisando sistemas de classificação na web sob a perspectiva da interação social em comunidades de prática., , and . IHC, volume 378 of ACM International Conference Proceeding Series, page 40-49. ACM, (2008)Ontology for Malware Behavior: A Core Model Proposal., , , , , and . WETICE, page 453-458. IEEE Computer Society, (2014)