Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Source Code Authorship Attribution Using Long Short-Term Memory Based Networks., , , , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 65-82. Springer, (2017)System Call-Based Detection of Malicious Processes., , and . QRS, page 119-124. IEEE, (2015)Malware Anomaly Detection on Virtual Assistants., , , , and . MALWARE, page 124-131. IEEE, (2018)Exploring Paraphrasing Techniques on Formal Language for Generating Semantics Preserving Source Code Transformations., , , and . ICSC, page 242-248. IEEE, (2020)Simulation of Attacker Defender Interaction in a Noisy Security Game., , , and . CoRR, (2022)Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem., , and . GameSec, volume 13061 of Lecture Notes in Computer Science, page 354-364. Springer, (2021)Demonstration of COSAK static analysis tools., , , and . DISCEX (2), page 7-9. IEEE Computer Society, (2003)Run-time classification of malicious processes using system call analysis., , and . MALWARE, page 21-28. IEEE Computer Society, (2015)Behavioral anomaly detection of malware on home routers., , , , , and . MALWARE, page 47-54. IEEE Computer Society, (2017)Workshop on Code Based Software Security Assessments (CoBaSSA 2005)., and . WCRE, page 233. IEEE Computer Society, (2005)