Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/sesp2013.bht:"
@inproceedings{DBLP:conf/ccs/Chen13, author = {Hao Chen}, editor = {Yan Chen and XiaoFeng Wang}, title = {Underground economy of android application plagiarism}, booktitle = {Proceedings of the first international workshop on Security in embedded systems and smartphones, {SESP} 2013, Hangzhou, China, May 8, 2013}, pages = {1--2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484417.2484419}, doi = {10.1145/2484417.2484419}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Chen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuoXJ13, author = {Weiliang Luo and Shouhuai Xu and Xuxian Jiang}, editor = {Yan Chen and XiaoFeng Wang}, title = {Real-time detection and prevention of android {SMS} permission abuses}, booktitle = {Proceedings of the first international workshop on Security in embedded systems and smartphones, {SESP} 2013, Hangzhou, China, May 8, 2013}, pages = {11--18}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484417.2484422}, doi = {10.1145/2484417.2484422}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuoXJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TakahashiEKMM13, author = {Takeshi Takahashi and Keita Emura and Akira Kanaoka and Shin'ichiro Matsuo and Tadashi Minowa}, editor = {Yan Chen and XiaoFeng Wang}, title = {Risk visualization and alerting system: architecture and proof-of-concept implementation}, booktitle = {Proceedings of the first international workshop on Security in embedded systems and smartphones, {SESP} 2013, Hangzhou, China, May 8, 2013}, pages = {3--10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484417.2484421}, doi = {10.1145/2484417.2484421}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TakahashiEKMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangHFYM13, author = {Xinyi Zhang and Weili Han and Zheran Fang and Yuliang Yin and Hossen Asiful Mustafa}, editor = {Yan Chen and XiaoFeng Wang}, title = {Role mining algorithm evaluation and improvement in large volume android applications}, booktitle = {Proceedings of the first international workshop on Security in embedded systems and smartphones, {SESP} 2013, Hangzhou, China, May 8, 2013}, pages = {19--26}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484417.2484423}, doi = {10.1145/2484417.2484423}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangHFYM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013sesp, editor = {Yan Chen and XiaoFeng Wang}, title = {Proceedings of the first international workshop on Security in embedded systems and smartphones, {SESP} 2013, Hangzhou, China, May 8, 2013}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484417}, doi = {10.1145/2484417}, isbn = {978-1-4503-2068-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013sesp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.