Author of the publication

Know your enemy: the risk of unauthorized access in smartphones by insiders.

, , , , and . Mobile HCI, page 271-280. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Boshmaf, Yazan
add a person with the name Boshmaf, Yazan
 

Other publications of authors with the same name

Interacting with Large Distributed Datasets Using Sketch., , , , , , , , and . EGPGV, page 31-43. Eurographics Association, (2016)Source Attribution of Cryptographic API Misuse in Android Applications., , and . AsiaCCS, page 133-146. ACM, (2018)SIMD-Scan: Ultra Fast in-Memory Table Scan using on-Chip Vector Processing Units., , , , , and . PVLDB, 2 (1): 385-394 (2009)Design and analysis of a social botnet., , , and . Computer Networks, 57 (2): 556-578 (2013)Key Challenges in Defending Against Malicious Socialbots., , , and . LEET, USENIX Association, (2012)Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs., , , , , , , and . Computers & Security, (2016)BlockTag: Design and applications of a tagging system for blockchain analysis., , and . CoRR, (2018)Characterizing Bitcoin donations to open source software on GitHub., , , and . CoRR, (2019)Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population., , , , , and . NSPW, page 11-22. ACM, (2016)Thwarting Fake OSN Accounts by Predicting their Victims., , , and . AISec@CCS, page 81-89. ACM, (2015)