Automatic security verification of mobile app configurations. Costa, G., Merlo, A., Verderame, L., & Armando, A. Future Generation Computer Systems, 2015. cited By 0; Article in Press
Paper doi bibtex @ARTICLE{Costa2015,
author={Costa, G., Merlo, A., Verderame, L., Armando, A.},
title={Automatic security verification of mobile app configurations},
journal={Future Generation Computer Systems},
year={2015},
doi={10.1016/j.future.2016.06.014},
note={cited By 0; Article in Press},
url={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979584081&partnerID=40&md5=56ecda46c18992eed6f5dd99cee80fed},
document_type={Article in Press},
source={Scopus},
}
Downloads: 0
{"_id":"YzBYxY2f79wfDGH76","bibbaseid":"costa-merlo-verderame-armando-automaticsecurityverificationofmobileappconfigurations-2015","downloads":0,"creationDate":"2016-08-26T10:31:53.292Z","title":"Automatic security verification of mobile app configurations","author_short":["Costa, G.","Merlo, A.","Verderame, L.","Armando, A."],"year":2015,"bibtype":"article","biburl":"https://dl.dropboxusercontent.com/u/1703583/AlessioMerloPubs.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Costa"],"firstnames":["G."],"suffixes":[]},{"propositions":[],"lastnames":["Merlo"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Verderame"],"firstnames":["L."],"suffixes":[]},{"propositions":[],"lastnames":["Armando"],"firstnames":["A."],"suffixes":[]}],"title":"Automatic security verification of mobile app configurations","journal":"Future Generation Computer Systems","year":"2015","doi":"10.1016/j.future.2016.06.014","note":"cited By 0; Article in Press","url":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979584081&partnerID=40&md5=56ecda46c18992eed6f5dd99cee80fed","document_type":"Article in Press","source":"Scopus","bibtex":"@ARTICLE{Costa2015,\nauthor={Costa, G., Merlo, A., Verderame, L., Armando, A.},\ntitle={Automatic security verification of mobile app configurations},\njournal={Future Generation Computer Systems},\nyear={2015},\ndoi={10.1016/j.future.2016.06.014},\nnote={cited By 0; Article in Press},\nurl={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979584081&partnerID=40&md5=56ecda46c18992eed6f5dd99cee80fed},\ndocument_type={Article in Press},\nsource={Scopus},\n}\n\n","author_short":["Costa, G.","Merlo, A.","Verderame, L.","Armando, A."],"key":"Costa2015","id":"Costa2015","bibbaseid":"costa-merlo-verderame-armando-automaticsecurityverificationofmobileappconfigurations-2015","role":"author","urls":{"Paper":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979584081&partnerID=40&md5=56ecda46c18992eed6f5dd99cee80fed"},"downloads":0,"html":""},"search_terms":["automatic","security","verification","mobile","app","configurations","costa","merlo","verderame","armando"],"keywords":[],"authorIDs":["57c00b7c5abfdd4d540000cb"],"dataSources":["fXnmFPiSA9DtpTTdf"]}