All Stories

  1. Human in the loop reinforcement learning framework for adaptive phishing detection
  2. ViTDroid: Vision Transformers for Efficient, Explainable Attention to Malicious Behavior in Android Binaries
  3. LL-XSS: End-to-End Generative Model-based XSS Payload Creation
  4. Using Capsule Networks for Android Malware Detection Through Orientation-Based Features
  5. Employing Takaful Islamic Banking through State of the Art Blockchain: A Case Study
  6. Deep neural architectures for large scale android malware analysis
  7. Design and implementation of an attestation protocol for measured dynamic behavior
  8. TSSDroid: TSS API for the Android software stack
  9. Realization of a user-centric, privacy preserving permission framework for Android
  10. Transforming high-level requirements to executable policies for Android
  11. Towards a high-level trusted computing API for Android software stack
  12. Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace
  13. How secure is your smartphone: An analysis of smartphone security mechanisms
  14. A sense of others
  15. POAuth
  16. MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services
  17. Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
  18. Apex
  19. A Trustworthy Identity Management Architecture for e-Government Processes
  20. A trustworthy identity management architecture for e-government processes in Pakistan
  21. Identity Management System for Electronic Government Processes in Pakistan