Author of the publication

Is this app safe for children?: a comparison study of maturity ratings on Android and iOS applications.

, , , and . WWW, page 201-212. International World Wide Web Conferences Steering Committee / ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks., , , and . ACM Trans. Inf. Syst. Secur., 11 (4): 18:1-18:43 (2008)SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks., , , and . MobiHoc, page 356-367. ACM, (2006)Routing in Socially Selfish Delay Tolerant Networks., , and . INFOCOM, page 857-865. IEEE, (2010)A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses., , , , and . INFOCOM, page 2455-2463. IEEE, (2009)Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection., , , and . INFOCOM, page 2089-2097. IEEE, (2019)SET: Detecting node clones in sensor networks., , and . SecureComm, page 341-350. IEEE, (2007)Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification., and . ACM Trans. Inf. Syst. Secur., 11 (3): 15:1-15:30 (2008)On the Effectiveness of Internal Patching Against File-Sharing Worms., , and . ACNS, volume 5037 of Lecture Notes in Computer Science, page 1-20. (2008)Self-healing wireless networks under insider jamming attacks., , , and . CNS, page 220-228. IEEE, (2014)Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks., , , and . ACM Trans. Sens. Networks, 4 (4): 23:1-23:34 (2008)