Author of the publication

Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System.

, , and . ISC Int. J. Inf. Secur., 14 (3): 61-69 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Reconfigurable Web Service Composition Framework Using Reo Coordination Language., , and . ECOWS, page 203-212. IEEE Computer Society, (2007)SANT: Static Analysis of Native Threads for Security Vetting of Android Applications., and . ISC Int. J. Inf. Secur., 14 (1): 13-25 (2022)Interdependency Analysis in Security Investment against Strategic Attacks., and . Inf. Syst. Frontiers, 22 (1): 187-201 (2020)A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware., , and . ISC Int. J. Inf. Secur., 15 (1): 59-71 (2023)Measuring of Strategies' Similarity in Automated Negotiation., , and . IMECS, page 859-863. Newswood Limited, (2007)An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks., , and . IWSEC, volume 7038 of Lecture Notes in Computer Science, page 129-143. Springer, (2011)A conceptual framework for specification, analysis, and design of anonymity services., and . EDBT/ICDT Workshops, volume 360 of ACM International Conference Proceeding Series, page 131-138. ACM, (2009)Privacy, reputation, and incentive provision for vehicular social networks., , and . J. Reliab. Intell. Environ., 9 (4): 447-461 (December 2023)A machine learning approach for detecting and categorizing evasion sources in Android malware., , , and . ISCISC, page 28-34. IEEE, (2021)MEGDroid: A model-driven event generation framework for dynamic android malware analysis., , and . Inf. Softw. Technol., (2021)