Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/wisec/wisec2015.bht:"
@inproceedings{DBLP:conf/wisec/0002BLS15, author = {Matthias Sch{\"{a}}fer and Daniel S. Berger and Vincent Lenders and Jens B. Schmitt}, title = {Security by mobility in location and track verification}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {29:1--29:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774988}, doi = {10.1145/2766498.2774988}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/0002BLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BrenzaPP15, author = {Sebastian Brenza and Andre Pawlowski and Christina P{\"{o}}pper}, title = {A practical investigation of identity theft vulnerabilities in Eduroam}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {14:1--14:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766512}, doi = {10.1145/2766498.2766512}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BrenzaPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChenZ15, author = {Xin Chen and Sencun Zhu}, title = {DroidJust: automated functionality-aware privacy leakage analysis for Android applications}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {5:1--5:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766507}, doi = {10.1145/2766498.2766507}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChenZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CuiWHXZY15, author = {Xingmin Cui and Jingxuan Wang and Lucas Chi Kwong Hui and Zhongwei Xie and Tian Zeng and Siu{-}Ming Yiu}, title = {WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {25:1--25:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766509}, doi = {10.1145/2766498.2766509}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/CuiWHXZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DaiGCXL15, author = {Guqian Dai and Jigang Ge and Minghang Cai and Daoqian Xu and Wenjia Li}, title = {SVM-based malware detection for Android applications}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {33:1--33:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774991}, doi = {10.1145/2766498.2774991}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DaiGCXL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DeBruhlWST15, author = {Bruce DeBruhl and Sean Weerakkody and Bruno Sinopoli and Patrick Tague}, title = {Is your commute driving you crazy?: a study of misbehavior in vehicular platoons}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {22:1--22:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766505}, doi = {10.1145/2766498.2766505}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DeBruhlWST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/EmaraWS15, author = {Karim Emara and Wolfgang Woerndl and Johann H. Schlichter}, title = {{CAPS:} context-aware privacy scheme for {VANET} safety applications}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {21:1--21:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766500}, doi = {10.1145/2766498.2766500}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/EmaraWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FarhangHZ15, author = {Sadegh Farhang and Yezekael Hayel and Quanyan Zhu}, title = {Physical layer location privacy issue in wireless small cell networks}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {32:1--32:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774990}, doi = {10.1145/2766498.2774990}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FarhangHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FerreiraKBLD15, author = {Denzil Ferreira and Vassilis Kostakos and Alastair R. Beresford and Janne Lindqvist and Anind K. Dey}, title = {Securacy: an empirical investigation of Android applications' network usage, privacy and security}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {11:1--11:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766506}, doi = {10.1145/2766498.2766506}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FerreiraKBLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ForsterKL15, author = {David F{\"{o}}rster and Frank Kargl and Hans L{\"{o}}hr}, title = {A framework for evaluating pseudonym strategies in vehicular ad-hoc networks}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {19:1--19:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766520}, doi = {10.1145/2766498.2766520}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ForsterKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Freudiger15, author = {Julien Freudiger}, title = {How talkative is your mobile device?: an experimental study of Wi-Fi probe requests}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {8:1--8:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766517}, doi = {10.1145/2766498.2766517}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Freudiger15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GalloHDNKGJR15, author = {Roberto Gallo and Patricia Hongo and Ricardo Dahab and Luiz C. Navarro and Henrique Kawakami and Kaio Galv{\~{a}}o and Glauco Barroso Junquera and Luander Ribeiro}, title = {Security and system architecture: comparison of Android customizations}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {12:1--12:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766519}, doi = {10.1145/2766498.2766519}, timestamp = {Fri, 24 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/GalloHDNKGJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GisdakisGP15, author = {Stylianos Gisdakis and Thanassis Giannetsos and Panos Papadimitratos}, title = {{SHIELD:} a data verification framework for participatory sensing systems}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {16:1--16:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766503}, doi = {10.1145/2766498.2766503}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GisdakisGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Jensen15, author = {Meiko Jensen}, title = {Applying the protection goals for privacy engineering to mobile devices}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {26:1--26:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774986}, doi = {10.1145/2766498.2774986}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Jensen15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MaassMSWS15, author = {Max Maass and Uwe M{\"{u}}ller and Tom Schons and Daniel Wegemer and Matthias Schulz}, title = {NFCGate: an {NFC} relay application for Android}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {27:1--27:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774984}, doi = {10.1145/2766498.2774984}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MaassMSWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MatteAC15, author = {C{\'{e}}lestin Matte and Jagdish Prasad Achara and Mathieu Cunche}, title = {Device-to-identity linking attack using targeted wi-fi geolocation spoofing}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {20:1--20:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766521}, doi = {10.1145/2766498.2766521}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MatteAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NagyBCAOS15, author = {Marcin Nagy and Thanh Bui and Emiliano De Cristofaro and N. Asokan and J{\"{o}}rg Ott and Ahmad{-}Reza Sadeghi}, title = {How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {18:1--18:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766501}, doi = {10.1145/2766498.2766501}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/NagyBCAOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NagyBUAO15, author = {Marcin Nagy and Thanh Bui and Swapnil Udar and N. Asokan and J{\"{o}}rg Ott}, title = {SpotShare and nearbyPeople: applications of the Social PaL framework}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {31:1--31:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774985}, doi = {10.1145/2766498.2774985}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/NagyBUAO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OnwuzurikeC15, author = {Lucky Onwuzurike and Emiliano De Cristofaro}, title = {Danger is my middle name: experimenting with {SSL} vulnerabilities in Android apps}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {15:1--15:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766522}, doi = {10.1145/2766498.2766522}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/OnwuzurikeC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PagninYHM15, author = {Elena Pagnin and Anjia Yang and Gerhard P. Hancke and Aikaterini Mitrokotsa}, title = {HB+DB, mitigating man-in-the-middle attacks against {HB+} with distance bounding}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {3:1--3:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766516}, doi = {10.1145/2766498.2766516}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PagninYHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PietroO15, author = {Roberto Di Pietro and Gabriele Oligeri}, title = {Freedom of speech: thwarting jammers via a probabilistic approach}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766515}, doi = {10.1145/2766498.2766515}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PietroO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PingSM15, author = {Dan Ping and Xin Sun and Bing Mao}, title = {TextLogger: inferring longer inputs on touch screen using motion sensors}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {24:1--24:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766511}, doi = {10.1145/2766498.2766511}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/PingSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PodiyanBZ15, author = {Pradeep Podiyan and Sergey Butakov and Pavol Zavarsky}, title = {Study of compliance of Android location APIs with Geopriv}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {30:1--30:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774989}, doi = {10.1145/2766498.2774989}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/PodiyanBZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RahmanATC15, author = {Mahmudur Rahman and Mozhgan Azimpourkivi and Umut Topkara and Bogdan Carbunar}, title = {Liveness verifications for citizen journalism videos}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {17:1--17:10}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766502}, doi = {10.1145/2766498.2766502}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/RahmanATC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RobynsQL15, author = {Pieter Robyns and Peter Quax and Wim Lamotte}, title = {Injection attacks on 802.11n {MAC} frame aggregation}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {13:1--13:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766513}, doi = {10.1145/2766498.2766513}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RobynsQL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SeneviratneKS15, author = {Suranga Seneviratne and Harini Kolamunna and Aruna Seneviratne}, title = {A measurement study of tracking in paid mobile applications}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {7:1--7:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766523}, doi = {10.1145/2766498.2766523}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SeneviratneKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SteinmetzerSH15, author = {Daniel Steinmetzer and Matthias Schulz and Matthias Hollick}, title = {Lockpicking physical layer key exchange: weak adversary models invite the thief}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {1:1--1:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766514}, doi = {10.1145/2766498.2766514}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SteinmetzerSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SunLL15, author = {Mingshen Sun and Mengmeng Li and John C. S. Lui}, title = {DroidEagle: seamless detection of visually similar Android apps}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {9:1--9:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766508}, doi = {10.1145/2766498.2766508}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SunLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TippenhauerLKC15, author = {Nils Ole Tippenhauer and Heinrich Luecken and Marc Kuhn and Srdjan Capkun}, title = {{UWB} rapid-bit-exchange system for distance bounding}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {2:1--2:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766504}, doi = {10.1145/2766498.2766504}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/TippenhauerLKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WagnerTBR15, author = {Daniel T. Wagner and Daniel R. Thomas and Alastair R. Beresford and Andrew C. Rice}, title = {Device analyzer: a privacy-aware platform to support research on the Android ecosystem}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {34:1--34:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774992}, doi = {10.1145/2766498.2774992}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/WagnerTBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WangYLJZD15, author = {Daibin Wang and Haixia Yao and Yingjiu Li and Hai Jin and Deqing Zou and Robert H. Deng}, title = {{CICC:} a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766518}, doi = {10.1145/2766498.2766518}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WangYLJZD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/XieZ15, author = {Zhen Xie and Sencun Zhu}, title = {AppWatcher: unveiling the underground market of trading mobile app reviews}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {10:1--10:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766510}, doi = {10.1145/2766498.2766510}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/XieZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YouQGBQT15, author = {Wanqing You and Kai Qian and Minzhe Guo and Prabir Bhattacharya and Ying Qian and Lixin Tao}, title = {A hybrid approach for mobile security threat analysis}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {28:1--28:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774987}, doi = {10.1145/2766498.2774987}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/YouQGBQT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhouWWJ15, author = {Yajin Zhou and Lei Wu and Zhi Wang and Xuxian Jiang}, title = {Harvesting developer credentials in Android apps}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {23:1--23:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766499}, doi = {10.1145/2766498.2766499}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ZhouWWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2015, title = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2766498}, isbn = {978-1-4503-3623-9}, timestamp = {Mon, 06 Jul 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.