Author of the publication

mallotROPism: a metamorphic engine for malicious software variation development.

, , and . Int. J. Inf. Sec., 21 (1): 61-78 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IntentAuth: Securing Android's Intent-based inter-process communication., , and . Int. J. Inf. Sec., 21 (5): 973-982 (2022)A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems., , , , , , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 134-152. Springer, (2022)Dypermin: Dynamic permission mining framework for android platform., , and . Comput. Secur., (2018)The Far Side of Mobile Application Integrated Development Environments., , and . TrustBus, volume 9830 of Lecture Notes in Computer Science, page 111-122. Springer, (2016)Aligning the Concepts of Risk, Security and Privacy Towards the Design of Secure Intelligent Transport Systems., , , , , , and . CyberICPS/SECPRE/ADIoT@ESORICS, volume 12501 of Lecture Notes in Computer Science, page 170-184. Springer, (2020)On Android's activity hijacking prevention., , and . Comput. Secur., (2021)mallotROPism: a metamorphic engine for malicious software variation development., , and . Int. J. Inf. Sec., 21 (1): 61-78 (2022)Security and privacy enhancing mechanisms for the android operating system. University of Piraeus, Greece, (2021)National Archive of PhD Theses: oai:10442/50754.Standardizing Security Evaluation Criteria for Connected Vehicles: A Modular Protection Profile., , , , , , and . CSCN, page 1-7. IEEE, (2019)