From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Investigating machine learning attacks on financial time series models., , , , , и . Comput. Secur., (2022)Assessing Privacy Risks in Android: A User-Centric Approach., , и . RISK@ICTSS, том 8418 из Lecture Notes in Computer Science, стр. 21-37. Springer, (2013)A Risk Assessment Method for Smartphones., , и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 443-456. Springer, (2012)Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection, , , и . Technologies, 8 (4): 64 (2020)Towards Lightweight URL-Based Phishing Detection., , и . Future Internet, 13 (6): 154 (2021)A Secure Smartphone Applications Roll-out Scheme., , , и . TrustBus, том 6863 из Lecture Notes in Computer Science, стр. 49-61. Springer, (2011)Mobile Devices - A Phisher's Paradise., , , и . SECRYPT, стр. 79-87. SciTePress, (2014)Exploring the Adoption of Physical Security Controls in Smartphones., , , , и . HCI (22), том 9190 из Lecture Notes in Computer Science, стр. 287-298. Springer, (2015)Security Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devices., , , и . Sensors, 24 (17): 5465 (сентября 2024)An Intensive Analysis of Security and Privacy Browser Add-Ons., , и . CRiSIS, том 9572 из Lecture Notes in Computer Science, стр. 258-273. Springer, (2015)