ImportéDetection of Malicious Android Applications Based on Verification of Indicators of Compromise and Machine Learning TechniquesTheodore Dama, Aminata Sabané, Abdoul Kader Kaboré, Tegawendé F. BissyandéImportéImproving Web User Tracking Systems Through Browser FingerprintingGoya Alama Désiré Dao, Abdoul Kader Kaboré, Aminata Sabané, Rodrique Kafando, Tegawendé F. BissyandéImportéOptimizing Real-Time Video Analytics for Resource-Constrained EnvironmentsRodrique Kafando, Aminata Sabané, Tegawendé F. BissyandéImportéDamFlow: Preventing a Flood of Irrelevant Data Flows in Android AppsMarco Alecci, Jordan Samhi, Marc Miltenberger, Steven Arzt, Tegawendé F. Bissyandé, Jacques KleinImportéYou Got Phished! Analyzing How to Provide Useful Feedback in Anti-Phishing Training with LLM Teacher ModelsTailia Malloy, Laura Bernardy, Omar El Bachyr, Fred Philippy, Jordan Samhi, Jacques Klein, Tegawendé F. Bissyandé |