Browse Items

Browse/Search Results:  1-3 of 3 Help

Filters                
Selected(0)Clear Items/Page:    Sort:
POSTER: Security analysis of personal unmanned aerial vehicles 会议论文
12TH EAI INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2016, Guangzhou, China
Authors:  Chen, Peng;  Chen, Hao
Adobe PDF(170Kb)  |  Favorite  |  View/Download:101/0  |  Submit date:2017/08/26
On the Origin of Mobile Apps: Network Provenance for Android Applications 会议论文
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, New Orleans, LA, United states
Authors:  Stevens, Ryan;  Crussell, Jonathan;  Chen, Hao
Adobe PDF(753Kb)  |  Favorite  |  View/Download:111/0  |  Submit date:2017/07/04
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps 会议论文
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, Xi'an, China
Authors:  Fang, Zheran;  Han, Weili;  Li, Dong;  Guo, Zeqing;  Guo, Danhao
Adobe PDF(919Kb)  |  Favorite  |  View/Download:164/0  |  Submit date:2017/07/04