Author of the publication

Improving dynamic analysis of android apps using hybrid test input generation.

, , and . Cyber Security, page 1-8. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low power Gm-boosted differential Colpitts VCO., , , , , and . SoCC, page 247-250. IEEE, (2011)Detecting packed executables using steganalysis., , , and . EUVIP, page 1-5. IEEE, (2014)OSCIDS: An Ontology based SCADA Intrusion Detection Framework., , and . SECRYPT, page 327-335. SciTePress, (2016)MaldomDetector: A system for detecting algorithmically generated domain names with machine learning., , , and . Comput. Secur., (2020)DL-Droid: Deep learning based android malware detection using real devices., , and . Comput. Secur., (2020)Cybersecurity Engineering: Bridging the Security Gaps in Advanced Automotive Systems and ISO/SAE 21434., , , , , , and . VTC2023-Spring, page 1-6. IEEE, (2023)Policy-Based Profiles for Network Intrusion Response Systems., , and . CSR, page 279-286. IEEE, (2022)DEV-PIM: Dynamic Execution Validation with Processing-in-Memory., , , , , and . ETS, page 1-6. IEEE, (2023)EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning., , and . IWSPA@CODASPY, page 65-72. ACM, (2017)High-Performance random data lookup for network processing., , , and . SoCC, page 272-277. IEEE, (2010)