Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using engine signature to detect metamorphic malware., and . WORM, page 73-78. ACM Press, (2006)DroidLegacy: Automated Familial Classification of Android Malware., , and . PPREW@POPL, page 3:1-3:12. ACM, (2014)Identifying Shared Software Components to Support Malware Forensics., , , , , , , and . DIMVA, volume 8550 of Lecture Notes in Computer Science, page 21-40. Springer, (2014)Incorporating `Programming Techniques' into Prolog Programs.. NACLP, page 426-440. MIT Press, (1989)Normalizing Metamorphic Malware Using Term Rewriting., , , and . SCAM, page 75-84. IEEE Computer Society, (2006)Abstracting Stack to Detect Obfuscated Calls in Binaries., and . SCAM, page 17-26. IEEE Computer Society, (2004)Malware and Machine Learning., and . Intelligent Methods for Cyber Warfare, volume 563 of Studies in Computational Intelligence, Springer, (2015)Restructuring Functions with Low Cohesion., and . WCRE, page 36-46. IEEE Computer Society, (1999)Imposing Order on Program Statements to Assist Anti-Virus Scanners., and . WCRE, page 161-170. IEEE Computer Society, (2004)Restructuring programs by tucking statements into functions., and . Inf. Softw. Technol., 40 (11-12): 677-689 (1998)