Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing malware normalizers using term rewriting., , , and . J. Comput. Virol., 4 (4): 307-322 (2008)Deployable Classifiers for Malware Detection., , , and . ICISTM, volume 285 of Communications in Computer and Information Science, page 384-395. Springer, (2012)Adversarial Variational Modality Reconstruction and Regularization for Zero-Day Malware Variants Similarity Detection., , , , , and . ICDM, page 1131-1136. IEEE, (2022)A transformation-based model of malware derivation., and . MALWARE, page 17-25. IEEE Computer Society, (2012)Observing and Measuring Cognitive Support: Steps Toward Systematic Tool Evaluation and Engineering.. IWPC, page 185-195. IEEE Computer Society, (2003)Towards a Clone Detection Benchmark Suite and Results Archive., , , and . IWPC, page 285-287. IEEE Computer Society, (2003)Improving Adoptability by Preserving, Leveraging, and Adding Cognitive Support To Existing Tools and Environments. Workshop on Adoption-Centric Software Engineering at ICSE03, page 36--41. Portland, OR, SEI, (2003)Program Structure-Based Feature Selection for Android Malware Analysis., , and . MobiSec, volume 107 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 51-52. Springer, (2012)A Survey of Anomaly Detection for Connected Vehicle Cybersecurity and Safety., , , and . Intelligent Vehicles Symposium, page 421-426. IEEE, (2018)Enterprise Security with Adaptive Ensemble Learning on Cooperation and Interaction Patterns., , , , and . CCNC, page 1-7. IEEE, (2020)