An android application sandbox system for suspicious software detection T Bläsing, L Batyuk, AD Schmidt, SA Camtepe, S Albayrak 2010 5th International Conference on Malicious and Unwanted Software, 55-62, 2010 | 718 | 2010 |
Static analysis of executables for collaborative malware detection on android AD Schmidt, R Bye, HG Schmidt, J Clausen, O Kiraz, KA Yuksel, ... 2009 IEEE International Conference on Communications, 1-5, 2009 | 421 | 2009 |
Monitoring smartphones for anomaly detection AD Schmidt, F Peters, F Lamour, C Scheel, SA Camtepe, Ş Albayrak Mobile Networks and Applications 14, 92-106, 2009 | 255 | 2009 |
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications L Batyuk, M Herpich, SA Camtepe, K Raddatz, AD Schmidt, S Albayrak 2011 6th International Conference on Malicious and Unwanted Software, 66-72, 2011 | 202 | 2011 |
Smartphone malware evolution revisited: Android next target? AD Schmidt, HG Schmidt, L Batyuk, JH Clausen, SA Camtepe, S Albayrak, ... 2009 4th International conference on malicious and unwanted software …, 2009 | 152 | 2009 |
Enhancing security of linux-based android devices AD Schmidt, HG Schmidt, J Clausen, KA Yuksel, O Kiraz, A Camtepe, ... Proceedings of 15th International Linux Kongress, 1-16, 2008 | 147 | 2008 |
Detecting symbian os malware through static function call analysis AD Schmidt, JH Clausen, A Camtepe, S Albayrak 2009 4th International Conference on Malicious and Unwanted Software …, 2009 | 89 | 2009 |
Developing and benchmarking native linux applications on android L Batyuk, AD Schmidt, HG Schmidt, A Camtepe, S Albayrak MobileWireless Middleware, Operating Systems, and Applications: Second …, 2009 | 87 | 2009 |
Malicious software for smartphones AD Schmidt, S Albayrak Technische Universität Berlin-DAI-Labor, Tech. Rep. TUBDAI 2, 08-01, 2008 | 58 | 2008 |
A simulation framework for smart meter security evaluation J Chinnow, K Bsufka, AD Schmidt, R Bye, A Camtepe, S Albayrak 2011 IEEE International Conference on Smart Measurements of Future Grids …, 2011 | 34 | 2011 |
Detection of smartphone malware AD Schmidt | 31 | 2011 |
WannaDrive? Feasible Attack Paths and Effective Protection Against Ransomware in Modern Vehicles TE Marko Wolf, Robert Lambert, Aubrey-Derrick Schmidt Escar Europe 2017 10, 2017 | 27* | 2017 |
Static smartphone malware detection AD Schmidt, A Camtepe, S Albayrak Proceedings of the 5th security research conference (future security 2010), 146, 2010 | 27 | 2010 |
A probabilistic diffusion scheme for anomaly detection on smartphones T Alpcan, C Bauckhage, AD Schmidt Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010 | 26 | 2010 |
Behavioral biometrics for persistent single sign-on T Mustafić, A Messerman, SA Camtepe, AD Schmidt, S Albayrak Proceedings of the 7th ACM workshop on Digital identity management, 73-82, 2011 | 24 | 2011 |
Monitoring android for collaborative anomaly detection: A first architectural draft AD Schmidt, R Bye, HG Schmidt, KA Yksel, O Kiraz, J Clausen, K Raddatz, ... Technische Universität Berlin-DAI-Labor, Tech. Rep. TUB-DAI 8, 08-02, 2008 | 10 | 2008 |
Google Android: a comprehensive introduction [Technical Report: TUB-DAI 03/09-01] HG Schmidt, K Raddatz, AD Schmidt, S Camtepe, S Albayrak DAI-Labor, 2009 | 9 | 2009 |
Waterfall simulation by using a particle and grid-based hybrid approach N Mukai, Y Sakai, Y Chang 2014 International Conference on Cyberworlds, 23-30, 2014 | 6 | 2014 |
Sensor-basierte Erkennung und Reaktion im häuslichen Umfeld K Raddatz, AD Schmidt, A Thiele, J Chinnow, D Grunewald, S Albayrak Ambient Assisted Living 2012, 5. Deutsche AAL Kongress, 2012 | 5 | 2012 |
Monitoring android for collaborative anomaly detection: a first architectural draft [Technical Report: TUB-DAI 08/08-02] AD Schmidt, R Bye, HG Schmidt, KA Yuksel, J Clausen, K Raddatz, ... DAI-Labor, 2008 | 1 | 2008 |