[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/journals/jocsap/BellizziLCCV23>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Christian_Colombo_0001>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Eleonora_Losiouk>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Jennifer_Bellizzi>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Mark_Vella>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Mauro_Conti>
foaf:homepage <http://dx.doi.org/doi.org%2F10.3390%2Fjcp3030019>
foaf:homepage <https://doi.org/10.3390/jcp3030019>
dc:identifier DBLP journals/jocsap/BellizziLCCV23 (xsd:string)
dc:identifier DOI doi.org%2F10.3390%2Fjcp3030019 (xsd:string)
dcterms:issued 2023 (xsd:gYear)
swrc:journal <https://dblp.l3s.de/d2r/resource/journals/jocsap>
rdfs:label VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Christian_Colombo_0001>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Eleonora_Losiouk>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Jennifer_Bellizzi>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Mark_Vella>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Mauro_Conti>
swrc:month July (xsd:string)
swrc:number 3 (xsd:string)
swrc:pages 364-395 (xsd:string)
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/journals/jocsap/BellizziLCCV23/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/journals/jocsap/BellizziLCCV23>
rdfs:seeAlso <http://dblp.uni-trier.de/db/journals/jocsap/jocsap3.html#BellizziLCCV23>
rdfs:seeAlso <https://doi.org/10.3390/jcp3030019>
dc:title VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:Article
rdf:type foaf:Document
swrc:volume 3 (xsd:string)