Author of the publication

A Secure Smartphone Applications Roll-out Scheme.

, , , and . TrustBus, volume 6863 of Lecture Notes in Computer Science, page 49-61. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating machine learning attacks on financial time series models., , , , , and . Comput. Secur., (2022)Assessing Privacy Risks in Android: A User-Centric Approach., , and . RISK@ICTSS, volume 8418 of Lecture Notes in Computer Science, page 21-37. Springer, (2013)Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection, , , and . Technologies, 8 (4): 64 (2020)Towards Lightweight URL-Based Phishing Detection., , and . Future Internet, 13 (6): 154 (2021)A Risk Assessment Method for Smartphones., , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 443-456. Springer, (2012)A Secure Smartphone Applications Roll-out Scheme., , , and . TrustBus, volume 6863 of Lecture Notes in Computer Science, page 49-61. Springer, (2011)Exploring the Adoption of Physical Security Controls in Smartphones., , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 287-298. Springer, (2015)Mobile Devices - A Phisher's Paradise., , , and . SECRYPT, page 79-87. SciTePress, (2014)An Intensive Analysis of Security and Privacy Browser Add-Ons., , and . CRiSIS, volume 9572 of Lecture Notes in Computer Science, page 258-273. Springer, (2015)On the Feasibility of Malware Attacks in Smartphone Platforms., , , and . ICETE (Selected Papers), volume 314 of Communications in Computer and Information Science, page 217-232. Springer, (2011)