Author of the publication

CHEX: statically vetting Android apps for component hijacking vulnerabilities.

, , , , and . CCS, page 229-240. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Matching Conflicts: Functional Validation of Agents, and . AAAI Workshop of Agent Conflicts, page 14--19. Orlando, Florida, AAAI Press, (July 1999)Enabling Information Confidentiality in Publish/Subscribe Overlay Services., , , , , and . ICC, page 5624-5628. IEEE, (2008)Understanding Internet Video sharing site workload: A view from data center design., , , , , and . J. Vis. Commun. Image Represent., 21 (2): 129-138 (2010)Adaptive Sensor Placement and Boundary Estimation for Monitoring Mass Objects., , and . IEEE Trans. Syst. Man Cybern. Part B, 38 (1): 222-232 (2008)Untangling mixed information to calibrate resource utilization in virtual machines., , , , , and . ICAC, page 151-160. ACM, (2011)Integrating Community and Role Detection in Information Networks., , , , , and . SDM, page 72-80. SIAM, (2016)State space exploration using feedback constraint generation and Monte-Carlo sampling., , , and . ESEC/SIGSOFT FSE, page 321-330. ACM, (2007)Fault Detection in Distributed Systems by Representative Subspace Mapping., , and . ICPR (4), page 912-915. IEEE Computer Society, (2006)Network-aware coordination of virtual machine migrations in enterprise data centers and clouds., , , and . IM, page 888-891. IEEE, (2013)Correlating real-time monitoring data for mobile network management., , , and . WOWMOM, page 1-8. IEEE Computer Society, (2008)