Author of the publication

Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts.

, , , and . AINA Workshops, page 344-351. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards revealing JavaScript program intents using abstract interpretation., and . AINTEC, page 87-94. ACM, (2010)A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude., and . IEICE Trans. Inf. Syst., 94-D (11): 2159-2166 (2011)A Survey of Smart Home IoT Device Classification Using Machine Learning-Based Network Traffic Analysis., , , and . IEEE Access, (2022)A Trusted Knowledge Management System for Multi-layer Threat Analysis., , , , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 214-215. Springer, (2014)An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents., , , , , and . IEEE Access, (2019)Generative Deep Learning for Internet of Things Network Traffic Generation., , , , and . PRDC, page 70-79. IEEE, (2020)Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service., , , , , and . ARES, page 47:1-47:8. ACM, (2018)Enabling secure multitenancy in cloud computing: Challenges and approaches., , , , , and . BCFIC, page 72-79. IEEE, (2012)Interactions between artificial intelligence and cybersecurity to protect future networks., , , , and . Ann. des Télécommunications, 77 (11-12): 727-729 (2022)ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks., , and . CCS, page 3662-3663. ACM, (2023)