Cyber Threat Detection & Attack Attribution Time-predictable hardware platformsReal-time scheduling algorithmsAndroid Malware Detection Powered by Formal Analysis and Machine Learning ApproachesDesign, Optimization and Verification TechnologiesRuntime Security Verification for Mobile Devices A Threat Operating Model (TOM) for Early Warning of Cybersecurity ThreatsText Detection Importance in Cyber IntelligenceGuided, Stochastic Model-Based GUI Testing of Android Apps