Aisha I. Ali-Gombe
Orcid: 0000-0002-2563-0557
According to our database1,
Aisha I. Ali-Gombe
authored at least 29 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Forensic Sci. Int. Digit. Investig., 2024
Enhancing privacy policy comprehension through Privacify: A user-centric approach using advanced language models.
Comput. Secur., 2024
User Privacy in the Digital Playground: An In-Depth Investigation of Facebook Instant Games.
Proceedings of the IEEE Secure Development Conference, 2024
2023
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices.
Comput. Secur., September, 2023
Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals.
Proceedings of the IEEE Secure Development Conference, 2023
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
2022
Intent-aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the HCI International 2022 - Late Breaking Papers. Interaction in New Media, Learning and Games, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
I Don't Know Why You Need My Data: A Case Study of Popular Social Media Privacy Policies.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Digit. Investig., 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Object Allocation Pattern as an Indicator for Maliciousness - An Exploratory Analysis.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics.
Comput. Secur., 2020
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Digit. Investig., 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
2018
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming.
Comput. Secur., 2018
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2016
Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015