Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advanced threat intelligence: detection and classification of anomalous behavior in system processes., and . Elektrotech. Informationstechnik, 137 (1): 38-44 (2020)Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode., , and . ICISSP, page 346-353. SciTePress, (2017)Classifying malicious system behavior using event propagation trees., , , and . iiWAS, page 23:1-23:10. ACM, (2015)TAON: an ontology-based approach to mitigating targeted attacks., , and . iiWAS, page 303-312. ACM, (2016)Advanced threat intelligence: interpretation of anomalous behavior in ubiquitous kernel processes.. De Montfort University, Leicester, UK, (2019)British Library, EThOS.Sequitur-based Inference and Analysis Framework for Malicious System Behavior., , , and . ICISSP, page 632-643. SciTePress, (2017)The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns., , , , , , and . ARES, page 18:1-18:10. ACM, (2018)LLR-Based Sentiment Analysis for Kernel Event Sequences., , and . AINA, page 764-771. IEEE Computer Society, (2017)Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis., , , , , , and . VizSEC, page 9-16. ACM, (2014)Empirical Malware Research through Observation of System Behaviour., , , and . WWW (Companion Volume), page 467-469. ACM, (2016)