Author of the publication

Cypider: building community-based cyber-defense infrastructure for android malware detection.

, , , and . ACSAC, page 348-362. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Denotational Semantic Model for Validating JVML/CLDC Optimizations under Isabelle/HOL., , and . QSIC, page 348-355. IEEE Computer Society, (2007)Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité., , , and . Technique et Science Informatiques, 28 (5): 611-644 (2009)Security hardening of open source software., , and . PST, volume 380 of ACM International Conference Proceeding Series, page 43. ACM, (2006)Delay aware measurements gathering in WAMS communication network., , , , and . GlobalSIP, page 1090-1094. IEEE, (2017)A Formal Approach for the Forensic Analysis of Logs., , and . SoMeT, volume 147 of Frontiers in Artificial Intelligence and Applications, page 159-176. IOS Press, (2006)A detection and mitigation model for PTP delay attack in a smart grid substation., , and . SmartGridComm, page 497-502. IEEE, (2015)Detection of Cyber Attacks on Synchro-Phasor Network Targeting Topology Detection Application of Power Distribution Grids., , , , , , and . SmartGridComm, page 1-6. IEEE, (2023)Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams., , , and . ECBS, page 515-522. IEEE Computer Society, (2007)Final Summary Report on Enterprise Security., , , and . WETICE, page 134. IEEE Computer Society, (1999)A Game Theoretic Model to Handle Network Intrusions over Multiple Packets., , and . ICC, page 2189-2194. IEEE, (2006)