Author of the publication

Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques.

, , , , and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 810-822. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Koala, Gouayon
add a person with the name Koala, Gouayon
 

Other publications of authors with the same name

Vulnerability Analysis in Mobile Banking and Payment Applications on Android in African Countries., , , and . InterSol, volume 321 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 164-175. Springer, (2020)Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities., , , and . InterSol, volume 449 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 105-115. Springer, (2022)Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques., , , , and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 810-822. Springer, (2020)Software Vulnerabilities Detection Using a Trace-Based Analysis Model., , , and . AFRICOMM, volume 499 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 446-457. Springer, (2022)Analysis of the Impact of Permissions on the Vulnerability of Mobile Applications., , , , and . AFRICOMM, volume 311 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-14. Springer, (2019)