Veelasha Moonsamy
Veelasha Moonsamy
Assistant Professor at Radboud University, The Netherlands
Bestätigte E-Mail-Adresse bei veelasha.org - Startseite
TitelZitiert vonJahr
Mining permission patterns for contrasting clean and malicious android applications
V Moonsamy, J Rong, S Liu
Future Generation Computer Systems 36, 122-132, 2014
792014
Analysis of malicious and benign android applications
M Alazab, V Moonsamy, L Batten, P Lantz, R Tian
2012 32nd International Conference on Distributed Computing Systems …, 2012
512012
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
R Spreitzer, V Moonsamy, T Korak, S Mangard
IEEE Communications Surveys & Tutorials, 2017
462017
Towards an understanding of the impact of advertising on data leaks
V Moonsamy, M Alazab, L Batten
International journal of security and networks 7 (3), 181-193, 2012
262012
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
RK Konoth, E Vineti, V Moonsamy, M Lindorfer, C Kruegel, H Bos, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
242018
Feature reduction to speed up malware classification
V Moonsamy, R Tian, L Batten
Nordic Conference on Secure IT Systems, 176-188, 2011
232011
New Directions in IoT Privacy Using Attribute-Based Authentication: Position Paper
G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, ...
New York: ACM, 2016
152016
Contrasting permission patterns between clean and malicious android applications
V Moonsamy, J Rong, S Liu, G Li, L Batten
International Conference on Security and Privacy in Communication Systems, 69-85, 2013
152013
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices
R Spolaor, L Abudahi, V Moonsamy, M Conti, R Poovendran
International Conference on Applied Cryptography and Network Security, 83-102, 2017
142017
An analysis of tracking settings in Blackberry 10 and Windows Phone 8 Smartphones
Y Rahulamathavan, V Moonsamy, L Batten, S Shunliang, M Rajarajan
Australasian Conference on Information Security and Privacy, 430-437, 2014
132014
A comparison of the classification of disparate malware collected in different time periods
R Islam, R Tian, V Moonsamy, L Batten
Journal of networks 7 (6), 946-955, 2012
92012
Mitigating man-in-the-middle attacks on smartphones-a discussion of SSL Pinning and DNSSec
V Moonsamy, LM Batten
Proceedings of the 12th Australian Information Security Management …, 2014
62014
Android applications: Data leaks via advertising libraries
V Moonsamy, L Batten
2014 International Symposium on Information Theory and its Applications, 314-317, 2014
52014
Efficient classification of android malware in the wild using robust static features
H Fereidooni, V Moonsamy, M Conti, L Batina
Protecting Mobile Networks and Devices: Challenges and Solutions 1, 181-209, 2016
42016
Smartphone Applications, Malware and Data Theft
LM Batten, V Moonsamy, M Alazab
Computational Intelligence, Cyber Security and Computational Models, 15-24, 2016
42016
Zero permission android applications-attacks and defenses
V Moonsamy, L Batten
ATIS 2012: Proceedings of the 3rd Applications and Technologies in …, 2012
42012
Can Smartphone Users Turn Off Tracking Service Settings?
V Moonsamy, L Batten, M Shore
Proceedings of International Conference on Advances in Mobile Computing …, 2013
32013
The Risk of Advertizing Libraries on Android Mobile Devices
LM Batten, V Moonsamy
22013
Gamut: Sifting through Images to Detect Android Malware
J Gennissen, L Cavallaro, V Moonsamy, L Batina
12017
Fair Privacy: Improving Usability of the Android Permission System
M Derks, JH Hoepman, F van den Broek, V Moonsamy, K Jongenburger, ...
12015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20