Search
Now showing items 1-6 of 6
Attack Tree Based Android Malware Detection with Hybrid Analysis
Publisher: IEEE
Year: 2014
Mining Specification of Insecure Browser Extension Behavior
Publisher: IEEE
Year: 2014
An Extended UML Method for the Verification of Security Protocols
Publisher: IEEE
Year: 2014