Author of the publication

BISSAM: Automatic Vulnerability Identification of Office Documents.

, , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 204-213. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MalFlow: identification of C&C servers through host-based data flow profiling., , , , , and . SAC, page 2087-2094. ACM, (2016)'State of the Union': Evaluating Open Source Zero Trust Components., , and . STM, volume 14336 of Lecture Notes in Computer Science, page 42-61. Springer, (2023)IT Security Incident Response: Current State, Emerging Problems, and New Approaches (IT-Sicherheitsvorfallsbehandlung: Derzeitiger Stand, Probleme und neue Methodiken). University of Erlangen-Nuremberg, Germany, (2018)base-search.net (ftuniverlangen:oai:ub.uni-erlangen.de-opus:9219).Sharing Communities: The Good, the Bad, and the Ugly., and . CCS, page 2755-2769. ACM, (2023)Towards incident handling in the cloud: challenges and approaches., and . CCSW, page 77-86. ACM, (2010)BISSAM: Automatic Vulnerability Identification of Office Documents., , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 204-213. Springer, (2012)Implementation of locking schemes in extended dependency graphs., and . Inf. Softw. Technol., 39 (7): 477-483 (1997)Klassifikation von IT-Sicherheitsvorfällen., , and . Datenschutz und Datensicherheit, 40 (1): 17-21 (2015)Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification., , and . CCSW@CCS, page 17-29. ACM, (2023)Analyse und Vergleich von BckR2D2-I und II., , , , , , and . Sicherheit, volume P-195 of LNI, page 47-58. GI, (2012)