Author of the publication

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).

, , , , , and . ACM Trans. Priv. Secur., 22 (2): 14:1-14:34 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware., , , and . ARES, page 599-608. IEEE Computer Society, (2016)Why allowing profile name reuse is a bad idea., , , , , , and . EUROSEC, page 3:1-3:6. ACM, (2016)MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)., , , , , and . ACM Trans. Priv. Secur., 22 (2): 14:1-14:34 (2019)"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks., , , , , , , and . CoRR, (2018)Tiresias: Predicting Security Events Through Deep Learning., , , and . ACM Conference on Computer and Communications Security, page 592-605. ACM, (2018)What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild., , and . Internet Measurement Conference, page 65-79. ACM, (2016)"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks., , , , , , , and . PACMHCI, 3 (CSCW): 207:1-207:21 (2019)What's in a Name?: Understanding Profile Name Reuse on Twitter., , , , , , and . WWW, page 1161-1170. ACM, (2017)Tiresias: Predicting Security Events Through Deep Learning., , , and . CoRR, (2019)Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier., , , and . IEEE Access, (2022)