Author of the publication

Data Is Flowing in the Wind: A Review of Data-Flow Integrity Methods to Overcome Non-Control-Data Attacks.

, and . SOCO-CISIS-ICEUTE, volume 527 of Advances in Intelligent Systems and Computing, page 536-544. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly-based Spam Filtering., , , , and . SECRYPT, page 5-14. SciTePress, (2011)Automatic Behaviour-based Analysis and Classification System for Malware Detection., , , , and . ICEIS (2), page 395-399. SciTePress, (2010)Combination of Machine-Learning Algorithms for Fault Prediction in High-Precision Foundries., , and . DEXA (2), volume 7447 of Lecture Notes in Computer Science, page 56-70. Springer, (2012)Tutorial 4: Adopting SOA., , and . ICCBSS, page 12. IEEE Computer Society, (2008)On the study of anomaly-based spam filtering using spam as representation of normality., , , , , and . CCNC, page 693-695. IEEE, (2012)Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies., , and . USENIX Security Symposium, page 679-694. USENIX Association, (2017)Sentiment analysis using convolutional neural network with fastText embeddings., , and . LA-CCI, page 1-5. IEEE, (2017)Opcode-Sequence-Based Semi-supervised Unknown Malware Detection., , , , and . CISIS, volume 6694 of Lecture Notes in Computer Science, page 50-57. Springer, (2011)Anomaly Detection Using String Analysis for Android Malware Detection., , , , , and . SOCO-CISIS-ICEUTE, volume 239 of Advances in Intelligent Systems and Computing, page 469-478. Springer, (2013)Enhanced Image Segmentation Using Quality Threshold Clustering for Surface Defect Categorisation in High Precision Automotive Castings., , , , , and . SOCO-CISIS-ICEUTE, volume 239 of Advances in Intelligent Systems and Computing, page 191-200. Springer, (2013)