9
David Barrera, Hilmi Günes Kayacik, Paul C. van Oorschot, and Anil Somayaji:
A methodology for empirical analysis of permission-based security models and its application to android.
ACM Conference on Computer and Communications Security (CCS), 2010
375% above average of year
Last visited: Jul-2022
10
Zi Chu, Steven Gianvecchio, Haining Wang, and Sushil Jajodia:
Who is tweeting on Twitter: human, bot, or cyborg?
Annual Computer Security Applications Conference (ACSAC), 2010
369% above average of year
Last visited: Jul-2022