Author of the publication

A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model.

, , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 604-622. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of User Data Privacy Management Controls on Mobile Device Investigations., and . IFIP Int. Conf. Digital Forensics, volume 484 of IFIP Advances in Information and Communication Technology, page 89-105. Springer, (2016)Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method., , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 115-126. Springer, (2014)Forensic analysis of wireless networking evidence of Android smartphones., , and . WIFS, page 109-114. IEEE, (2012)Bu-Dash: A Universal and Dynamic Graphical Password Scheme., , and . HCI (32), volume 13333 of Lecture Notes in Computer Science, page 209-227. Springer, (2022)A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem., , , and . IFIP Int. Conf. Digital Forensics, volume 462 of IFIP Advances in Information and Communication Technology, page 251-267. Springer, (2015)An Extensible Platform for the Forensic Analysis of Social Media Data., , , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 404-414. Springer, (2015)On the Development of Automated Forensic Analysis Methods for Mobile Devices., , , , , , , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 212-213. Springer, (2014)MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models., , , , , and . NDSS, The Internet Society, (2017)Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks., , , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 174-185. Springer, (2016)Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System., , , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 379-390. Springer, (2015)