Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Useful Features for Malware Detection in the Ember Dataset., , and . CANDAR Workshops, page 360-366. IEEE, (2019)Trends of anti-analysis operations of malwares observed in API call logs.. J. Comput. Virol. Hacking Tech., 14 (1): 69-85 (2018)Grammar Compression of Call Traces in Dynamic Malware Analysis., and . J. Inf. Process., (2017)Control of system calls from outside of virtual machines., , and . SAC, page 2116-1221. ACM, (2008)Load-based covert channels between Xen virtual machines., and . SAC, page 173-180. ACM, (2010)A 1-Tb 4b/Cell 4-Plane 162-Layer 3D Flash Memory With a 2.4-Gb/s I/O Speed Interface., , , , , , , , , and 39 other author(s). ISSCC, page 130-132. IEEE, (2022)BitVisor: a thin hypervisor for enforcing i/o device security., , , , , , , , , and 4 other author(s). VEE, page 121-130. ACM, (2009)MobileScope: A Programming Language with Objective Mobility., , , and . ICDCS Workshops, page 542-547. IEEE Computer Society, (2004)Controlling the speed of virtual time for malware deactivation., and . APSys, page 6. ACM, (2012)Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism., , , , and . CODASPY, page 127-134. ACM, (2018)