From post

Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection.

, , , и . RAID, том 8688 из Lecture Notes in Computer Science, стр. 130-149. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SigMal: a static signal processing based malware triage., , , и . ACSAC, стр. 89-98. ACM, (2013)Nexat: a history-based approach to predict attacker actions., , , , и . ACSAC, стр. 383-392. ACM, (2011)Network intrusion detection: dead or alive?. ACSAC, стр. 117-126. ACM, (2010)Extracting probable command and control signatures for detecting botnets., , , и . SAC, стр. 1657-1662. ACM, (2014)Detection and analysis of drive-by-download attacks and malicious JavaScript code., , и . WWW, стр. 281-290. ACM, (2010)Understanding Code Mobility., , и . IEEE Trans. Software Eng., 24 (5): 342-361 (1998)Malware Riding Badware: Challenges in Analyzing (Malicious/Benign) Web Applications.. RV, том 7687 из Lecture Notes in Computer Science, стр. 183. Springer, (2012)Protecting a Moving Target: Addressing Web Application Concept Drift., , , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 21-40. Springer, (2009)Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode., , и . RAID, том 6961 из Lecture Notes in Computer Science, стр. 61-80. Springer, (2011)Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection., , , и . RAID, том 8688 из Lecture Notes in Computer Science, стр. 130-149. Springer, (2014)