Cited By
View all- Costa GMerlo AVerderame LArmando A(2018)Automatic security verification of mobile app configurationsFuture Generation Computer Systems10.1016/j.future.2016.06.01480:C(519-536)Online publication date: 1-Mar-2018
- Karna AChen YYu HZhong HZhao J(2018)The role of model checking in software engineeringFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-6192-012:4(642-668)Online publication date: 1-Aug-2018
- Armando ACosta GMerlo AVerderame LAcs GMartin AMartinovic ICastelluccia CTraynor P(2014)Enabling BYOD through secure meta-marketProceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks10.1145/2627393.2627410(219-230)Online publication date: 23-Jul-2014
- Show More Cited By