Author of the publication

TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking.

, and . NTMS, page 1-5. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending Signatures of Reputation., , , , and . Privacy and Identity Management, volume 421 of IFIP Advances in Information and Communication Technology, page 165-176. Springer, (2013)Reachability Analysis of Term Rewriting Systems with Timbuk., and . LPAR, volume 2250 of Lecture Notes in Computer Science, page 695-706. Springer, (2001)BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports., , , and . SECRYPT, page 417-424. SCITEPRESS, (2023)Dada: Debiased Android DAtasets., , , , and . (October 2022)SEER4US, Secured Energy Efficient Routing for UAV Swarms., , , and . WiMob, page 1-6. IEEE, (2019)PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns., , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 5252-5264 (December 2022)URSID: Using formalism to Refine attack Scenarios for vulnerable Infrastructure Deployment., , , , and . CoRR, (2023)Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?, , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Policy-based intrusion detection in web applications by monitoring Java information flows., , , and . Int. J. Inf. Comput. Secur., 3 (3/4): 265-279 (2009)A privacy preserving distributed reputation mechanism., , , , and . ICC, page 1951-1956. IEEE, (2013)