Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems., , , , , , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 134-152. Springer, (2022)IntentAuth: Securing Android's Intent-based inter-process communication., , and . Int. J. Inf. Sec., 21 (5): 973-982 (2022)The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud., , and . CoRR, (2022)On Android's activity hijacking prevention., , and . Comput. Secur., (2021)Aligning the Concepts of Risk, Security and Privacy Towards the Design of Secure Intelligent Transport Systems., , , , , , and . CyberICPS/SECPRE/ADIoT@ESORICS, volume 12501 of Lecture Notes in Computer Science, page 170-184. Springer, (2020)Dypermin: Dynamic permission mining framework for android platform., , and . Comput. Secur., (2018)The Far Side of Mobile Application Integrated Development Environments., , and . TrustBus, volume 9830 of Lecture Notes in Computer Science, page 111-122. Springer, (2016)mallotROPism: a metamorphic engine for malicious software variation development., , and . Int. J. Inf. Sec., 21 (1): 61-78 (2022)Security and privacy enhancing mechanisms for the android operating system. University of Piraeus, Greece, (2021)National Archive of PhD Theses: oai:10442/50754.Standardizing Security Evaluation Criteria for Connected Vehicles: A Modular Protection Profile., , , , , , and . CSCN, page 1-7. IEEE, (2019)