From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition., , , , и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 249-260. Springer, (2012)Smartphone Security Evaluation - The Malware Attack Case ., , , и . SECRYPT, стр. 25-36. SciTePress, (2011)On the Feasibility of Malware Attacks in Smartphone Platforms., , , и . ICETE (Selected Papers), том 314 из Communications in Computer and Information Science, стр. 217-232. Springer, (2011)An Intensive Analysis of Security and Privacy Browser Add-Ons., , и . CRiSIS, том 9572 из Lecture Notes in Computer Science, стр. 258-273. Springer, (2015)I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild., и . IEEE Access, (2018)Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software., и . Comput. Secur., 31 (6): 802-803 (2012)Towards a Multi-Layered Phishing Detection., , и . Sensors, 20 (16): 4540 (2020)R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification., , , , и . IEEE Trans. Cybern., 50 (2): 525-535 (2020)A Risk Assessment Method for Smartphones., , и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 443-456. Springer, (2012)Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection, , , и . Technologies, 8 (4): 64 (2020)