Showing results 1 to 15 of 15
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
A Survey on Access Control in Fog Computing Journal:IEEE Communications Magazine | 2018 | 26 | ||
An adaptive gas cost mechanism for ethereum to defend against under-priced DoS attacks Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | 17 | ||
AndroidPerf: A cross-layer profiling system for Android applications Proceeding/Conference:2015 IEEE 23rd International Symposium on Quality of Service, IWQoS 2015 | 2016 | 8 | ||
AutoFlowLeaker: Circumventing web censorship through automation services Proceeding/Conference:Proceedings of the IEEE Symposium on Reliable Distributed Systems | 2017 | 8 | ||
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies Journal:Pervasive and Mobile Computing | 2017 | 13 | ||
Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy Journal:IEEE Transactions on Software Engineering | 2018 | 5 | ||
I know where you all are! exploiting mobile social apps for large-scale location privacy probing Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | 10 | ||
Muse: Towards robust and stealthy mobile botnets via multiple message push services Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | 10 | ||
NDroid: Toward tracking information flows across multiple android contexts Journal:IEEE Transactions on Information Forensics and Security | 2019 | 12 | ||
On measuring one-way path metrics from a web server Proceeding/Conference:Proceedings - International Conference on Network Protocols, ICNP | 2014 | 3 | ||
On tracking information flows through JNI in android applications Proceeding/Conference:Proceedings of the International Conference on Dependable Systems and Networks | 2014 | 3 | ||
Revisiting the description-to-behavior fidelity in android applications Proceeding/Conference:2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER 2016 | 2016 | 4 | ||
RootGuard: Protecting rooted android phones Journal:Computer | 2014 | 3 | ||
Towards a scalable resource-driven approach for detecting repackaged android applications Proceeding/Conference:Proceedings of the 30th Annual Computer Security Applications Conference | 2014 | 7 | ||
VulHunter: Toward discovering vulnerabilities in android applications Journal:IEEE Micro | 2015 | 7 |