Author of the publication

Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System.

, , and . ISC Int. J. Inf. Secur., 14 (3): 61-69 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A model-driven framework for developing multi-agent systems in emergency response environments., , , and . Softw. Syst. Model., 18 (3): 1985-2012 (2019)A Formalism for Specifying Model Merging Conflicts., , and . SAM, page 1-10. ACM, (2020)Maaker: A framework for detecting and defeating evasion techniques in Android malware., , and . J. Inf. Secur. Appl., (November 2023)Automatic Pattern Proposition in Transformation Life Cycle., and . IJITSA, 10 (2): 1-16 (2017)Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware., , and . ISC Int. J. Inf. Secur., 13 (2): 131-143 (2021)Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System., , and . CoRR, (2022)An executable domain-specific modeling language for simulating organizational auction-based coordination strategies for crisis response., , and . Simul. Model. Pract. Theory, (February 2024)Towards Personalized Change Propagation for Collaborative Modeling., , and . MoDELS (Companion), page 3-7. IEEE, (2021)A model-based framework for inter-app Vulnerability analysis of Android applications., , , , and . Softw. Pract. Exp., 53 (4): 895-936 (April 2023)Describing Pattern Languages for Checking Design Models., and . APSEC, page 197-204. IEEE Computer Society, (2009)