Author of the publication

HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security.

, and . QRS, page 168-175. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An HMM-based approach for automatic detection and classification of duplicate bug reports., , , , and . Inf. Softw. Technol., (2019)A survey of malware detection in Android apps: Recommendations and perspectives for future research., , , and . Comput. Sci. Rev., (2021)HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security., and . QRS, page 168-175. IEEE, (2017)Employing Feature Selection to Improve the Performance of Intrusion Detection Systems., , , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 93-112. Springer, (2021)Empirical study of android repackaged applications., , , and . Empir. Softw. Eng., 24 (6): 3587-3629 (2019)Understanding the Service Life Cycle of Android Apps: An Exploratory Study., , and . SPSM@CCS, page 81-86. ACM, (2015)Business Process-Based Information Security Risk Assessment., and . NSS, page 199-206. IEEE Computer Society, (2010)On the Use of API Calls for Detecting Repackaged Malware Apps: Challenges and Ideas., , and . ISSRE Workshops, page 116-117. IEEE, (2019)Half-Day Vulnerabilities: A study of the First Days of CVE Entries., and . CAMLIS, volume 3652 of CEUR Workshop Proceedings, page 152-180. CEUR-WS.org, (2023)Comparing the Effectiveness of Static, Dynamic and Hybrid Malware Detection on a Common Dataset., , , and . SMC, page 2452-2458. IEEE, (2023)