Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks., , , , , , , and . Proc. ACM Hum. Comput. Interact., 3 (CSCW): 207:1-207:21 (2019)Evolution, Detection and Analysis of Malware for Smart Devices., , , and . IEEE Commun. Surv. Tutorials, 16 (2): 961-987 (2014)Novel Tools for the Management, Representation, and Exploitation of Textual Information., , , and . Sci. Program., (2021)ObfSec: Measuring the security of obfuscations from a testing perspective., and . Expert Syst. Appl., (2022)BorderPatrol: Securing BYOD using Fine-Grained Contextual Information., , , and . DSN, page 460-472. IEEE, (2019)Smart Home Personal Assistants: A Security and Privacy Review., , and . ACM Comput. Surv., 53 (6): 116:1-116:36 (2021)Exploring the security and privacy risks of chatbots in messaging services., , , , , and . IMC, page 581-588. ACM, (2022)Automatic Rule Generation Based on Genetic Programming for Event Correlation., , , , and . CISIS, volume 63 of Advances in Intelligent and Soft Computing, page 127-134. Springer, (2009)Artificial Immunity-based Correlation System., , , and . SECRYPT, page 422-425. SciTePress, (2011)Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware., , , and . IEEE Trans. Mob. Comput., 15 (4): 789-802 (2016)