Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

System Call-Based Detection of Malicious Processes., , and . QRS, page 119-124. IEEE, (2015)Malware Anomaly Detection on Virtual Assistants., , , , and . MALWARE, page 124-131. IEEE, (2018)Source Code Authorship Attribution Using Long Short-Term Memory Based Networks., , , , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 65-82. Springer, (2017)Exploring Paraphrasing Techniques on Formal Language for Generating Semantics Preserving Source Code Transformations., , , and . ICSC, page 242-248. IEEE, (2020)Simulation of Attacker Defender Interaction in a Noisy Security Game., , , and . CoRR, (2022)Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem., , and . GameSec, volume 13061 of Lecture Notes in Computer Science, page 354-364. Springer, (2021)System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection., , , , and . UbiSec, volume 1768 of Communications in Computer and Information Science, page 103-115. Springer, (2022)Demonstration of COSAK static analysis tools., , , and . DISCEX (2), page 7-9. IEEE Computer Society, (2003)Studying the Evolution of Software Systems Using Change Clusters., , , and . ICPC, page 46-55. IEEE Computer Society, (2006)Behavioral anomaly detection of malware on home routers., , , , , and . MALWARE, page 47-54. IEEE Computer Society, (2017)