Author of the publication

RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware.

, and . Comput. Networks, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Taxonomy of Security as a Service., and . OTM Conferences (2), volume 11230 of Lecture Notes in Computer Science, page 305-312. Springer, (2018)WPA3 Connection Deprivation Attacks., and . CRiSIS, volume 12026 of Lecture Notes in Computer Science, page 164-176. Springer, (2019)Secure Method Calls by Instrumenting Bytecode with Aspects., and . DBSec, volume 5645 of Lecture Notes in Computer Science, page 126-141. Springer, (2009)Vehicle Software Engineering (VSE): Research and Practice., , and . IEEE Internet Things J., 7 (10): 10137-10149 (2020)Collaboration through computation: incorporating trust model into service-based software systems., , and . Serv. Oriented Comput. Appl., 3 (1): 47-63 (2009)Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security., , , and . ACM Comput. Surv., 56 (2): 45:1-45:35 (February 2024)Trustworthiness testing of phishing websites: A behavior model-based approach., and . Future Gener. Comput. Syst., 28 (8): 1258-1271 (2012)AIM: An Android Interpretable Malware detector based on application class modeling., , and . J. Inf. Secur. Appl., (June 2023)A classification of attacks to In-Vehicle Components (IVCs)., , , and . Veh. Commun., (2020)Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game., , , and . IEEE Trans. Reliab., 70 (3): 970-985 (2021)