147 | -- | 160 | Supraja Suresh, Fabio Di Troia, Katerina Potika, Mark Stamp. An analysis of Android adware |
161 | -- | 175 | Marcello Pogliani, Davide Quarta, Mario Polino, Martino Vittone, Federico Maggi, Stefano Zanero. Security of controlled manufacturing systems in the connected factory: the case of industrial robots |
177 | -- | 194 | Razieh Eskandari, Mahdi Shajari, Mojtaba Mostafavi Ghahfarokhi. ERES: an extended regular expression signature for polymorphic worm detection |
195 | -- | 208 | Yeong Tyng Ling, Nor Fazlida Mohd Sani, Mohd Taufik Abdullah, Nor Asilah Wati Abdul Hamid. Nonnegative matrix factorization and metamorphic malware detection |
209 | -- | 218 | Abhishek Kumar Singh, C. D. Jaidhar, Ajay Kumara M. A.. Experimental analysis of Android malware detection based on combinations of permissions and API-calls |
219 | -- | 232 | A. V. Kozachok, S. A. Kopylov, Alexander Shelupanov, Oleg Evsutin. Text marking approach for data leakage prevention |