Warning: pg_query(): Query failed: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 in /dati/webiit-old/includes/database.pgsql.inc on line 138 Warning: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 query: SELECT data, created, headers, expire, serialized FROM cache_page WHERE cid = 'https://www-old.iit.cnr.it/taxonomy/term/1549' in /dati/webiit-old/includes/database.pgsql.inc on line 159 Warning: pg_query(): Query failed: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 in /dati/webiit-old/includes/database.pgsql.inc on line 138 Warning: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 query: SELECT data, created, headers, expire, serialized FROM cache_page WHERE cid = 'https://www-old.iit.cnr.it/taxonomy/term/1549' in /dati/webiit-old/includes/database.pgsql.inc on line 159 android | IIT - CNR - Istituto di Informatica e Telematica
IIT Home Page CNR Home Page

android

Pubblicazioni e prodotti editoriali prima del 01/01/2016

Addressing Privacy Issues in Location-based Collaborative and Distributed Environments

A Framework for Probabilistic Contract Compliance

An Implementation of Secure Two-Party Computation for Smartphones with Application to Privacy-Preserving Interest-Cast

A Portable Application Supporting ABA Intervention

Designing a Mobile Application to Record ABA Data

Enriching Graphic Maps to Enable Multimodal Interaction by Blind People

Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots

Privacy-Preserving Interest-Cast for Android smartphones

Probabilistic Contract Compliance for Mobile Applications

Risk Analysis of Android Applications: A Multi-Criteria and Usable Approach

Pubblicazioni e prodotti editoriali dal 01/01/2016

A Fuzzy-based Process Mining Approach for Dynamic Malware Detection

Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences

Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices

BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware

Formal Methods Meet Mobile Code Obfuscation

Identifying Mobile Repackaged Applications through Formal Methods

LEILA: formaL tool for idEntifying mobIle maLicious behAviour

MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes

Mobile Silent and Continuous Authentication using Apps Sequence

Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation

Model Checking for Mobile Android Malware Evolution

R-PackDroid: API Package-Based Characterization and Detection of Mobile Ransomware

Stateful Data Usage Control for Android Mobile Devices

Twinkle Twinkle Little DroidDream, How I Wonder What You Are?

Visualizing the outcome of dynamic analysis of Android malware with VizMal