Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Language-Agnostic Model for Semantic Source Code Labeling., , , , and . CoRR, (2019)CrowdSource: Automated Inference of High Level Malware Functionality from Low-Level Symbols Using a Crowd Trained Machine Learning Model., , and . CoRR, (2016)Improving Zero-Day Malware Testing Methodology Using Statistically Significant Time-Lagged Test Samples., and . CoRR, (2016)eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys, and . (2017)cite arxiv:1702.08568.Visualization of shared system call sequence relationships in large malware corpora., , and . VizSEC, page 33-40. ACM, (2012)CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model., , and . MALWARE, page 68-75. IEEE Computer Society, (2014)CATBERT: Context-Aware Tiny BERT for Detecting Social Engineering Emails., , and . CoRR, (2020)Malicious Behavior Detection using Windows Audit Logs., , and . AISec@CCS, page 35-44. ACM, (2015)Purple Llama CyberSecEval: A Secure Coding Benchmark for Language Models., , , , , , , , , and 11 other author(s). CoRR, (2023)SEEM: a scalable visualization for comparing multiple large sets of attributes for malware analysis., , , , and . VizSEC, page 72-79. ACM, (2014)