Author of the publication

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).

, , , , , and . ACM Trans. Priv. Secur., 22 (2): 14:1-14:34 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity., , and . Journal of Computer Security, 22 (3): 355-381 (2014)A Lightweight Framework forWeb Services Invocation over Bluetooth., , , and . ICWS, page 331-338. IEEE Computer Society, (2006)Data Handling in the Smart Grid: Do We Know Enough?, , and . Critical Infrastructure Protection, volume 417 of IFIP Advances in Information and Communication Technology, page 21-32. Springer, (2013)Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication., , , and . CoRR, (2013)Privacy-Preserving Crowd-Sourcing of Web Searches with Private Data Donor., , , and . WWW, page 1487-1497. ACM, (2019)A Bluetooth-Based JXME Infrastructure., and . OTM Conferences (1), volume 4803 of Lecture Notes in Computer Science, page 667-682. Springer, (2007)Preserving Query Privacy in Urban Sensing Systems., and . ICDCN, volume 7129 of Lecture Notes in Computer Science, page 218-233. Springer, (2012)SplitBox: Toward Efficient Private Network Function Virtualization., , , , , and . HotMiddlebox@SIGCOMM, page 7-13. ACM, (2016)From risk factors to detection and intervention: a practical proposal for future work on cyberbullying., , , , , and . Behaviour & IT, 37 (3): 258-266 (2018)Participatory Privacy: Enabling Privacy in Participatory Sensing, and . CoRR, (2012)