Survey of Dynamic Anti-Analysis Schemes for Mobile Malware
Security of 5G-Mobile Backhaul Networks: A Survey
PPM: Privacy Policy Manager for Home Energy Management System
Open-Source Android App Detection considering the Effects of Code Obfuscation
A visual analytics approach for the cyber forensics based on different views of the network traffic
Modeling Advanced Persistent Threats to enhance anomaly detection techniques
Achieving trustworthy Homomorphic Encryption by combining it with a Trusted Execution Environment