Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poisoning Behavioral Malware Clustering., , , , , , and . CoRR, (2018)An Evasion Resilient Approach to the Detection of Malicious PDF Files., , , and . ICISSP (Revised Selected Papers), volume 576 of Communications in Computer and Information Science, page 68-85. Springer, (2015)Is data clustering in adversarial settings secure?, , , , , and . AISec, page 87-98. ACM, (2013)Machine learning in computer forensics (and the lessons learned from machine learning in computer security)., , and . AISec, page 99-104. ACM, (2011)PharmaGuard: Automatic identification of illegal search-indexed online pharmacies., , , , , , and . CYBCONF, page 324-329. IEEE, (2015)HMMPayl: An intrusion detection system based on Hidden Markov Models., , and . Comput. Secur., 30 (4): 221-241 (2011)The maven project: Management and Authenticity Verification of multimedia contents., , , , , , , , , and 4 other author(s). ICME Workshops, page 1-4. IEEE Computer Society, (2015)HMM-Web: A Framework for the Detection of Attacks Against Web Applications., , and . ICC, page 1-6. IEEE, (2009)Social Engineering 2.0: A Foundational Work: Invited Paper., , and . Conf. Computing Frontiers, page 319-325. ACM, (2017)2020 Cybercrime Economic Costs: No Measure No Solution., , , , , and . ARES, page 701-710. IEEE Computer Society, (2015)