Author of the publication

Understanding the Service Life Cycle of Android Apps: An Exploratory Study.

, , and . SPSM@CCS, page 81-86. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical study of android repackaged applications., , , and . Empir. Softw. Eng., 24 (6): 3587-3629 (2019)Understanding the Service Life Cycle of Android Apps: An Exploratory Study., , and . SPSM@CCS, page 81-86. ACM, (2015)On the Use of API Calls for Detecting Repackaged Malware Apps: Challenges and Ideas., , and . ISSRE Workshops, page 116-117. IEEE, (2019)Business Process-Based Information Security Risk Assessment., and . NSS, page 199-206. IEEE Computer Society, (2010)Half-Day Vulnerabilities: A study of the First Days of CVE Entries., and . CAMLIS, volume 3652 of CEUR Workshop Proceedings, page 152-180. CEUR-WS.org, (2023)Comparing the Effectiveness of Static, Dynamic and Hybrid Malware Detection on a Common Dataset., , , and . SMC, page 2452-2458. IEEE, (2023)Employing Feature Selection to Improve the Performance of Intrusion Detection Systems., , , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 93-112. Springer, (2021)HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security., and . QRS, page 168-175. IEEE, (2017)DarkGram: Exploring and Mitigating Cybercriminal content shared in Telegram channels., , , and . CoRR, (2024)