Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing users' privacy: static resolution of the dynamic properties of android.. University of Potsdam, Germany, (2019)A Formal Logic Framework for the Automation of the Right to Be Forgotten., , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 95-111. Springer, (2018)PIAnalyzer: A Precise Approach for PendingIntent Vulnerability Analysis., , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 41-59. Springer, (2018)ThiefTrap - An Anti-theft Framework for Android., , and . SecureComm, volume 238 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 167-184. Springer, (2017)LUDroid: A Large Scale Analysis of Android - Web Hybridization., , , and . SCAM, page 256-267. IEEE, (2019)Estimation with Information Loss: Asymptotic Analysis and Error Bounds., , , and . CDC/ECC, page 1215-1221. IEEE, (2005)Flaky test detection in Android via event order exploration., , , and . ESEC/SIGSOFT FSE, page 367-378. ACM, (2021)Patching Processor Design Errors with Programmable Hardware., , , , , and . IEEE Micro, 27 (1): 12-25 (2007)EVAL: Utilizing processors with variation-induced timing errors., , , and . MICRO, page 423-434. IEEE Computer Society, (2008)Electroencephalography Amplitude Modulation Analysis for Automated Affective Tagging of Music Video Clips., , , , and . Front. Comput. Neurosci., (2018)