Author of the publication

Deep Learning for Classification of Malware System Call Sequences.

, , , and . Australasian Conference on Artificial Intelligence, volume 9992 of Lecture Notes in Computer Science, page 137-149. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting and categorizing Android malware with graph neural networks., , and . SAC, page 409-412. ACM, (2021)HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs., , , and . ICANN (3), volume 12893 of Lecture Notes in Computer Science, page 127-138. Springer, (2021)Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks., and . PST, page 355-364. IEEE Computer Society, (2017)Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection., , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 263-277. Springer, (2018)The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security.. ICCST, page 1-6. IEEE, (2014)White paper on cybersecurity in the healthcare sector. The HEIR solution., , , , , , , , , and 22 other author(s). CoRR, (2023)Free Willy: Prune System Calls to Enhance Software Security., , and . SAC, page 1522-1529. ACM, (2023)Can Today's Machine Learning Pass Image-Based Turing Tests?, , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 129-148. Springer, (2019)INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain., , , , , and . Int. J. Inf. Sec., 23 (1): 347-371 (February 2024)Digital Forgetting Using Key Decay., and . SAC, page 34-41. ACM, (2023)