Experiences with embedding MPL security monitors into Java programs
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
pBMDS: a behavior-based malware detection system for cellphone devices
Proceedings of the third ACM conference on Wireless network security
Exploitation and threat analysis of open mobile devices
Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
SEIP: simple and efficient integrity protection for open mobile platforms
ICICS'10 Proceedings of the 12th international conference on Information and communications security
AmazonIA: when elasticity snaps back
Proceedings of the 18th ACM conference on Computer and communications security
Mobile platform architecture review: android, iphone, qt
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part II
Constroid: data-centric access control for android
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Use of ratings from personalized communities for trustworthy application installation
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Credential disabling from trusted execution environments
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Information Security Tech. Report
Hi-index | 0.00 |