Towards Tracking Data Flows in Cloud Architectures | 0 | 0.34 | 2020 |
liOS: Lifting iOS Apps for Fun and Profit | 0 | 0.34 | 2019 |
Annotary: A Concolic Execution System For Developing Secure Smart Contracts | 2 | 0.41 | 2019 |
WebEye - Automated Collection of Malicious HTTP Traffic. | 0 | 0.34 | 2018 |
BDABE - Blockchain-based Distributed Attribute based Encryption. | 0 | 0.34 | 2018 |
An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space. | 1 | 0.35 | 2018 |
Practical Decentralized Attribute-Based Delegation Using Secure Name Systems | 0 | 0.34 | 2018 |
Der Trusted Connector im Industrial Data Space. | 0 | 0.34 | 2018 |
LUCON: Data Flow Control for Message-Based IoT Systems | 2 | 0.37 | 2018 |
Ordol: Obfuscation-Resilient Detection Of Libraries In Android Applications | 0 | 0.34 | 2017 |
Ariadnima — Android Component Flow Reconstruction and Visualization | 0 | 0.34 | 2017 |
A Taxonomy-Based Approach For Security In Software-Defined Networking | 0 | 0.34 | 2017 |
Practical Application-Level Dynamic Taint Analysis of Android Apps | 0 | 0.34 | 2017 |
Test-Based Cloud Service Certification Of Opportunistic Providers | 0 | 0.34 | 2016 |
A Data Usage Control System Using Dynamic Taint Tracking | 2 | 0.37 | 2016 |
Generating Threat Profiles for Cloud Service Certification Systems | 1 | 0.37 | 2016 |
Preventing Library Spoofing on Android | 0 | 0.34 | 2015 |
ConDroid: Targeted Dynamic Analysis of Android Applications | 10 | 0.53 | 2015 |
Apparecium: Revealing Data Flows in Android Applications | 1 | 0.34 | 2015 |
Preventing Library Spoofing on Android | 1 | 0.35 | 2015 |
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps | 5 | 0.50 | 2014 |
NFC? Aber sicher. | 0 | 0.34 | 2014 |
An Antivirus Api For Android Malware Recognition | 2 | 0.45 | 2013 |
A Configurable and Extensible Security Service Architecture for Smartphones | 1 | 0.39 | 2013 |
Native code execution control for attack mitigation on android | 7 | 0.50 | 2013 |
Architecting a security strategy measurement and management system | 2 | 0.38 | 2012 |
Model-Based security event management | 3 | 0.43 | 2012 |
Security Policies in Dynamic Service Compositions. | 1 | 0.36 | 2012 |
APOLLON: TOWARDS A SEMANTICALLY EXTENSIBLE POLICY FRAMEWORK | 0 | 0.34 | 2011 |
APOLLON: TOWARDS A SEMANTICALLY EXTENSIBLE POLICY FRAMEWORK | 0 | 0.34 | 2011 |
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence | 1 | 0.37 | 2011 |
Interdomain Policy Conflicts | 0 | 0.34 | 2010 |
QoS-Aware Self-adaptation of Communication Protocols in a Pervasive Service Middleware | 6 | 0.53 | 2010 |
Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems. | 0 | 0.34 | 2010 |
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware | 7 | 0.49 | 2009 |
Towards Security in Decentralized Workflows | 2 | 0.36 | 2009 |
Securing Decentralized Workflows in Ambient Environments | 1 | 0.36 | 2008 |
On Path-Centric Navigation and Search Techniques for Personal Knowledge Stored in Topic Maps | 0 | 0.34 | 2007 |
Security made easy: Achieving user-friendly communication protection in ad-hoc situations | 0 | 0.34 | 2007 |