Author of the publication

AdRob: examining the landscape and impact of android application plagiarism.

, , , , , and . MobiSys, page 431-444. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprinting Data Based on Secret Mask., and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 155-162. Springer, (2012)ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks., , , , and . Wirel. Networks, 15 (4): 525-539 (2009)Mobile multi-layered IPsec., , , and . INFOCOM, page 1929-1939. IEEE, (2005)SET: Detecting node clones in sensor networks., , and . SecureComm, page 341-350. IEEE, (2007)User Behavior Modeling in a Cellular Network Using Latent Dirichlet Allocation., , , and . IDEAL, volume 8669 of Lecture Notes in Computer Science, page 36-44. Springer, (2014)AdRob: examining the landscape and impact of android application plagiarism., , , , , and . MobiSys, page 431-444. ACM, (2013)Channelization for Network Coding in Wireless Networks., , , and . INFOCOM, page 366-370. IEEE, (2008)Mobile multi-layered IPsec., , , and . Wireless Networks, 14 (6): 895-913 (2008)Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks., , , , , and . IEEE Trans. Mob. Comput., 6 (6): 663-677 (2007)Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks., , , , and . MobiQuitous, page 12-21. IEEE Computer Society, (2005)