Author of the publication

Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques.

, , , , and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 810-822. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of ZRP Zone Radius Value on Wireless Network Performance., , , and . AFRICOMM, volume 275 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 164-173. Springer, (2018)Analysis of the Impact of Permissions on the Vulnerability of Mobile Applications., , , , and . AFRICOMM, volume 311 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-14. Springer, (2019)Modeling the Parallelization of the Edmonds-Karp Algorithm and Application., , and . Computer and Information Science, 12 (3): 81-91 (2019)Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities., , , and . InterSol, volume 449 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 105-115. Springer, (2022)The Status Of IXPs In Africa: Failure Or Success?, , and . ITNAC, page 227-232. IEEE, (2022)G-Cloud: Opportunities and Security Challenges for Burkina Faso., , and . AFRICOMM, volume 208 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 79-87. Springer, (2016)Vulnerability Analysis in Mobile Banking and Payment Applications on Android in African Countries., , , and . InterSol, volume 321 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 164-175. Springer, (2020)Characterization of Malicious URLs Using Machine Learning and Feature Engineering., , , and . InterSol, volume 541 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 15-32. Springer, (2023)Blockchain Consensus Protocols - Towards a Review of Practical Constraints for Implementation in Developing Countries., , , , and . AFRICOMM, volume 250 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 304-314. Springer, (2017)Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques., , , , and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 810-822. Springer, (2020)