Author of the publication

AndRadar: Fast Discovery of Android Applications in Alternative Markets.

, , , , , , , , and . DIMVA, volume 8550 of Lecture Notes in Computer Science, page 51-71. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

All your face are belong to us: breaking Facebook's social authentication., , , , , , and . ACSAC, page 399-408. ACM, (2012)A fast eavesdropping attack against touchscreens., , and . IAS, page 320-325. IEEE, (2011)XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners., , , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 243-258. Springer, (2016)HelDroid: Dissecting and Detecting Mobile Ransomware., , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 382-404. Springer, (2015)Finding Non-trivial Malware Naming Inconsistencies., , , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 144-159. Springer, (2011)On-chip system call tracing: A feasibility study and open prototype., , , , and . CNS, page 73-81. IEEE, (2016)On the Use of Different Statistical Tests for Alert Correlation - Short Paper., and . RAID, volume 4637 of Lecture Notes in Computer Science, page 167-177. Springer, (2007)Lines of malicious code: insights into the malicious software industry., , , , and . ACSAC, page 349-358. ACM, (2012)Reducing false positives in anomaly detectors through fuzzy alert aggregation., , and . Inf. Fusion, 10 (4): 300-311 (2009)AndRadar: Fast Discovery of Android Applications in Alternative Markets., , , , , , , , and . DIMVA, volume 8550 of Lecture Notes in Computer Science, page 51-71. Springer, (2014)