Author of the publication

URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security.

, , , and . WISTP, volume 7886 of Lecture Notes in Computer Science, page 50-65. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatisierter Code-Audit - Sicherheitsanalyse von Source Code in Theorie und Praxis., and . Datenschutz und Datensicherheit, 31 (12): 888-893 (2007)Robustness to Code and Data Deletion in Autocatalytic Quines., , , and . Trans. Computational Systems Biology, (2008)Data-Centric Security for the IoT., , , and . IoT 360 (2), volume 170 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-86. (2015)BIONETS: Self Evolving Services in Opportunistic Networking Environments., , , , , , , , and . BIONETICS, volume 39 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 88-94. Springer, (2009)A Research Framework for Interaction Computing., and . OPAALS, volume 67 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 224-244. Springer, (2010)Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android., , , and . WISTP, volume 7322 of Lecture Notes in Computer Science, page 208-223. Springer, (2012)BIOMICS Project: Biological and Mathematical Basis of Interaction Computing., , , , , , , and . IJUC, 8 (4): 283-287 (2012)Self-Replicating and Self-Modifying Programs in Fraglets., , and . BIONETICS, page 159-167. ICST / IEEE, (2007)Adaptive Security Architectures for Global Sensing Applications., and . ECEASST, (2011)URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security., , , and . WISTP, volume 7886 of Lecture Notes in Computer Science, page 50-65. Springer, (2013)