Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating Cybersecurity Knowledge Graphs From Malware After Action Reports., , , , , and . IEEE Access, (2020)An investigation of byte n-gram features for malware classification., , , , , , , , and . J. Comput. Virol. Hacking Tech., 14 (1): 1-20 (2018)Minimizing Compute Costs: When Should We Run More Expensive Malware Analysis?, , , , , , , , , and . CAMLIS, volume 3391 of CEUR Workshop Proceedings, page 81-99. CEUR-WS.org, (2022)Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection., , , , , and . CoRR, (2020)Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus., , , , and . MALWARE, page 3-12. IEEE, (2018)KiloGrams: Very Large N-Grams for Malware Classification., , , , , , and . CoRR, (2019)Automatic Yara Rule Generation Using Biclustering., , , , , , , and . AISec@CCS, page 71-82. ACM, (2020)Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection., , , , , and . AAAI, page 9386-9394. AAAI Press, (2021)RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement., , , , , and . ASONAM, page 879-886. ACM, (2019)What can N-grams learn for malware detection?, , and . MALWARE, page 109-118. IEEE Computer Society, (2017)