From post

"Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications.

, и . CSCloud, стр. 181-186. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV., и . Ad Hoc Networks, (2017)Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things., , и . EvoApplications@EvoStar, том 13989 из Lecture Notes in Computer Science, стр. 177-193. Springer, (2023)A new approach for detection of insider attacks.. SIU, стр. 1-4. IEEE, (2013)Feature Selection for Detection of Ad Hoc Flooding Attacks., и . ACITY (1), том 176 из Advances in Intelligent Systems and Computing, стр. 507-513. Springer, (2012)Analysis of RPL Objective Functions with Security Perspective., , и . SENSORNETS, стр. 71-80. SCITEPRESS, (2022)A Lightweight Threshold-Based Improvement on DSDV., и . ADHOCNETS, том 129 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 135-145. Springer, (2013)Analysis of machine learning methods on malware detection., и . SIU, стр. 2066-2069. IEEE, (2014)"Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications., и . CSCloud, стр. 181-186. IEEE Computer Society, (2015)A grammatical evolution approach to intrusion detection on mobile ad hoc networks., и . WISEC, стр. 95-102. ACM, (2009)A Semi-Decentralized PKI Based on Blockchain With a Stake-Based Reward-Punishment Mechanism., , и . IEEE Access, (2024)