Login / Signup
Eavesdropping and obfuscation techniques for smartphones.
Supriyo Chakraborty
Omer Tripp
Published in:
MOBILESoft (2016)
Keyphrases
</>
mobile devices
reverse engineering
mobile applications
augmented reality
daily life
static analysis
control flow
smart devices
malware detection
data transformation
data mining
social networks
decision making
data structure