Author of the publication

MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes.

, , , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 3-19. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention., , , and . IEEE Trans. Dependable Secur. Comput., 15 (1): 83-97 (2018)Towards enforcing on-the-fly policies in BYOD environments., , , and . IAS, page 61-65. IEEE, (2013)Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV., , , , and . STM, volume 10547 of Lecture Notes in Computer Science, page 118-133. Springer, (2017)Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project., , , and . IEEE Secur. Priv., 20 (1): 33-44 (2022)A Multi-criteria-Based Evaluation of Android Applications., , , , , and . INTRUST, volume 7711 of Lecture Notes in Computer Science, page 67-82. Springer, (2012)Fast and Effective Clustering of Spam Emails Based on Structural Similarity., , , , and . FPS, volume 9482 of Lecture Notes in Computer Science, page 195-211. Springer, (2015)Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability., , , , , , , and . NetSoft, page 254-256. IEEE, (2019)Enhancing Android permission through usage control: a BYOD use-case., , and . SAC, page 2049-2056. ACM, (2016)Phylogenetic Analysis for Ransomware Detection and Classification into Families., , , and . ICETE (2), page 732-737. SciTePress, (2018)Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI., , and . CyberICPS/SECPRE@ESORICS, volume 11387 of Lecture Notes in Computer Science, page 192-212. Springer, (2018)