Author of the publication

Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques.

, , , , and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 810-822. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

G-Cloud: Opportunities and Security Challenges for Burkina Faso., , and . AFRICOMM, volume 208 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 79-87. Springer, (2016)Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities., , , and . InterSol, volume 449 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 105-115. Springer, (2022)Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques., , , , and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 810-822. Springer, (2020)Software Vulnerabilities Detection Using a Trace-Based Analysis Model., , , and . AFRICOMM, volume 499 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 446-457. Springer, (2022)Analysis of the Impact of Permissions on the Vulnerability of Mobile Applications., , , , and . AFRICOMM, volume 311 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-14. Springer, (2019)Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon., , , , and . AFRICOMM, volume 499 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 430-445. Springer, (2022)Design and implementation of secure communication protocols for Internet of Things systems., , , , and . ISC2, page 112-117. IEEE, (2019)Vulnerability Analysis in Mobile Banking and Payment Applications on Android in African Countries., , , and . InterSol, volume 321 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 164-175. Springer, (2020)Characterization of Malicious URLs Using Machine Learning and Feature Engineering., , , and . InterSol, volume 541 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 15-32. Springer, (2023)