Cited By
View all- Geetha BBhuva DBhuva ATrivedi MSathe DSinghal R(2024)Fortifying IoT: A Cybersecurity Model for Secure Implementation2024 7th International Conference on Contemporary Computing and Informatics (IC3I)10.1109/IC3I61595.2024.10829198(415-420)Online publication date: 18-Sep-2024
- Senanayake JKalutarage HAl-Kadri MPetrovski APiras L(2023)Android Source Code Vulnerability Detection: A Systematic Literature ReviewACM Computing Surveys10.1145/355697455:9(1-37)Online publication date: 16-Jan-2023
- Ahmad MBergadano FCostamagna VCrispo BRussello G(2023)AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions2023 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC58397.2023.10217861(1-7)Online publication date: 9-Jul-2023
- Show More Cited By