Author:
Petsas Thanasis,Voyatzis Giannis,Athanasopoulos Elias,Polychronakis Michalis,Ioannidis Sotiris
Cited by
123 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection;IEEE Transactions on Dependable and Secure Computing;2024-09
2. AndroLog: Android Instrumentation and Code Coverage Analysis;Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering;2024-07-10
3. Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
4. DocFlow: Extracting Taint Specifications from Software Documentation;Proceedings of the IEEE/ACM 46th International Conference on Software Engineering;2024-02-06
5. Dynamic Adversarial Method in Android Malware;Android Malware Detection and Adversarial Methods;2024