Related links
Identifying Mobile Malware and Key Threat Actors in Online
by J Grisham 2017 Cited by 77 All Your Droid Are Belong To Us : A Survey of Current Android Attacks. USENIX Conference on Offensive Technologies (WOOT). Vinyals, O., Kaiser, L., Koo, T.,
Learn more
Vulnerability Assessment Framework for Cloud Computing
by P Kamongi Cited by 72 All your droid are belong to us: a survey of current android attacks. In: Proceedings of the 5th USENIX conference on Offensive technologies. WOOT11. San.
Learn more