Autor der Publikation

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.

, , , , , , , und . ACM Conference on Computer and Communications Security, Seite 31-43. ACM, (2015)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

apl. Prof. Dr. -Ing. Niels Hansen University of Stuttgart

Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, und . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.
Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, und . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, , , , und . Nature Communications, 15 (1): 4925 (10.06.2024)
 

Weitere Publikationen von Autoren mit dem selben Namen

The store-and-flood distributed reflective denial of service attack., , , , , und . ICCCN, Seite 1-8. IEEE, (2014)POSTER: AdHoneyDroid - Capture Malicious Android Advertisements., , , , und . ACM Conference on Computer and Communications Security, Seite 1514-1516. ACM, (2014)Studying Malicious Websites and the Underground Economy on the Chinese Web., , , , , und . WEIS, (2008)Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews., , , , , , , , und . ACM Conference on Computer and Communications Security, Seite 829-844. ACM, (2017)SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications., , , , , , und . SPSM@CCS, Seite 93-104. ACM, (2012)Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations., , , , und . ACM Conference on Computer and Communications Security, Seite 1260-1272. ACM, (2015)Preventing drive-by download via inter-module communication monitoring., , , und . AsiaCCS, Seite 124-134. ACM, (2010)WebPatrol: automated collection and replay of web-based malware scenarios., , , , und . AsiaCCS, Seite 186-195. ACM, (2011)STDC: A SDN-Oriented Two-Stage DDoS Detection and Defence System Based on Clustering., , , und . TrustCom/BigDataSE, Seite 339-347. IEEE, (2018)A Hybrid Security Framework of Mobile Code., , , und . COMPSAC, Seite 390-395. IEEE Computer Society, (2004)