From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Creating Cybersecurity Knowledge Graphs From Malware After Action Reports., , , , , и . IEEE Access, (2020)An investigation of byte n-gram features for malware classification., , , , , , , , и . J. Comput. Virol. Hacking Tech., 14 (1): 1-20 (2018)Minimizing Compute Costs: When Should We Run More Expensive Malware Analysis?, , , , , , , , , и . CAMLIS, том 3391 из CEUR Workshop Proceedings, стр. 81-99. CEUR-WS.org, (2022)Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection., , , , , и . CoRR, (2020)Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus., , , , и . MALWARE, стр. 3-12. IEEE, (2018)KiloGrams: Very Large N-Grams for Malware Classification., , , , , , и . CoRR, (2019)Automatic Yara Rule Generation Using Biclustering., , , , , , , и . AISec@CCS, стр. 71-82. ACM, (2020)Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection., , , , , и . AAAI, стр. 9386-9394. AAAI Press, (2021)RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement., , , , , и . ASONAM, стр. 879-886. ACM, (2019)What can N-grams learn for malware detection?, , и . MALWARE, стр. 109-118. IEEE Computer Society, (2017)