Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads., , , and . CoRR, (2023)Typing abstractions and management in a component framework., , and . ASP-DAC, page 115-122. ACM, (2003)Ransomware Detection based on Network Behavior using Machine Learning and Hidden Markov Model with Gaussian Emission., , , and . CSR, page 227-233. IEEE, (2023)Malware Detection in Word Documents Using Machine Learning., , , and . ACeS, volume 1347 of Communications in Computer and Information Science, page 325-339. Springer, (2020)Translating concurrent action oriented specifications to synchronous guarded actions., , and . LCTES, page 47-56. ACM, (2010)Guest Editors' Introduction: Challenges for Reliable Design at the Nanoscale., , , and . IEEE Des. Test Comput., 22 (4): 295-297 (2005)An Insecurity Study of Ethereum Smart Contracts., , , and . SPACE, volume 12586 of Lecture Notes in Computer Science, page 188-207. Springer, (2020)APECS code synthesis: Extending ocarina for multi-threaded code synthesis from AADL models for Safety Critical applications., and . ICNSC, page 36-41. IEEE, (2014)Hardware optimizations for crypto implementations (Invited paper)., and . VDAT, page 1-6. IEEE, (2016)The challenge of interoperability: model-based integration for automotive control software., , , , and . DAC, page 58:1-58:6. ACM, (2015)