publication venue for Android Malware Characterization Using Metadata and Machine Learning Techniques 2018 Cybersecurity Vulnerability Analysis of the PLC PRIME Standard 2017 Weaknesses of fingerprint-based mutual authentication protocol. 8:2124-2134. 2015 Weaknesses in a new ultralightweight RFID authentication protocol with permutation-RAPP. 7:945-949. 2014