Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging Machine Learning for Ransomware Detection., and . CoRR, (2022)A Survey on Machine Learning-Based Ransomware Detection., , , and . ICMC, volume 1412 of Advances in Intelligent Systems and Computing, page 171-186. Springer, (2021)MalXCap: A Method for Malware Capability Extraction., , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 230-249. Springer, (2023)TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports., , , and . CoRR, (2024)TTPHunter: Automated Extraction of Actionable Intelligence as TTPs from Narrative Threat Reports., , , and . ACSW, page 126-134. ACM, (2023)RemOD: Operational Drift-Adaptive Intrusion Detection., , and . SPACE, volume 13783 of Lecture Notes in Computer Science, page 314-333. Springer, (2022)A Generalized Unknown Malware Classification., , , , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 793-806. Springer, (2022)