Author of the publication

Exploring Multiple Execution Paths for Malware Analysis.

, , and . S&P, page 231-245. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Umsetzung einer ökologieorientierten Unternehmungspolitik. Schriftenreihe des Instituts für Betriebswirtschaftliche Forschung an der Universität Zürich Haupt, Bern u.a., (1996)Towards Automated OCT-based Identification of White Brain Matter., , , , and . Bildverarbeitung für die Medizin, page 414-418. Springer, (2007)Hunting in the enterprise: Forensic triage and incident response., and . Digital Investigation, 10 (2): 89-98 (2013)On the Scalability of Genetic Algorithms to Very Large-Scale Feature Selection., and . EvoWorkshops, volume 1803 of Lecture Notes in Computer Science, page 77-86. Springer, (2000)Limits of Static Analysis for Malware Detection., , and . ACSAC, page 421-430. IEEE Computer Society, (2007)Extending the domain of definition of functional series for nonlinear systems.. Autom., 32 (8): 1233-1234 (1996)A scalable file based data store for forensic analysis., , and . Digit. Investig., (2015)«iMake-IT»: Invent, Code, and Shape Your World!: A workshop live stream from a science communication project where 5th grade students work in a makerspace on open-ended projects., , , , , and . FabLearn/MakeEd, page 23:1-23:3. ACM, (2021)PoX: Protecting users from malicious Facebook applications., , , and . Comput. Commun., 35 (12): 1507-1515 (2012)High K u materials approach to 100 Gbits/in 2, , , , , , , , and . IEEE Transactions on Magnetics, 36 (1): 10--15 (2000)