Autor der Publikation

Vulnerability Analysis in Mobile Banking and Payment Applications on Android in African Countries.

, , , und . InterSol, Volume 321 von Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Seite 164-175. Springer, (2020)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

G-Cloud: Opportunities and Security Challenges for Burkina Faso., , und . AFRICOMM, Volume 208 von Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Seite 79-87. Springer, (2016)Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities., , , und . InterSol, Volume 449 von Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Seite 105-115. Springer, (2022)Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques., , , , und . SoCPaR, Volume 1383 von Advances in Intelligent Systems and Computing, Seite 810-822. Springer, (2020)Software Vulnerabilities Detection Using a Trace-Based Analysis Model., , , und . AFRICOMM, Volume 499 von Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Seite 446-457. Springer, (2022)Analysis of the Impact of Permissions on the Vulnerability of Mobile Applications., , , , und . AFRICOMM, Volume 311 von Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Seite 3-14. Springer, (2019)5G NR PRACH Detection with Convolutional Neural Networks (CNN): Overcoming Cell Interference Challenges., , und . CoRR, (2024)Design and implementation of secure communication protocols for Internet of Things systems., , , , und . ISC2, Seite 112-117. IEEE, (2019)Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon., , , , und . AFRICOMM, Volume 499 von Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Seite 430-445. Springer, (2022)Vulnerability Analysis in Mobile Banking and Payment Applications on Android in African Countries., , , und . InterSol, Volume 321 von Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Seite 164-175. Springer, (2020)Characterization of Malicious URLs Using Machine Learning and Feature Engineering., , , und . InterSol, Volume 541 von Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Seite 15-32. Springer, (2023)