Author of the publication

Identifying Shared Software Components to Support Malware Forensics.

, , , , , , , and . DIMVA, volume 8550 of Lecture Notes in Computer Science, page 21-40. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

In situ reuse of logically extracted functional components., , and . J. Comput. Virol., 8 (3): 73-84 (2012)Instruction embedding for improved obfuscation., , , and . ACM Southeast Regional Conference, page 130-135. ACM, (2012)Artificial Intelligence Based Malware Analysis., , , , , , , , , and 5 other author(s). CoRR, (2017)Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection., , , , , , , , , and 5 other author(s). CoRR, (2020)Identifying Shared Software Components to Support Malware Forensics., , , , , , , and . DIMVA, volume 8550 of Lecture Notes in Computer Science, page 21-40. Springer, (2014)An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center., , , , , , , and . iThings/GreenCom/CPSCom/SmartData/Cybermatics, page 634-641. IEEE, (2020)VILO: a rapid learning nearest-neighbor classifier for malware triage., , , and . J. Comput. Virol. Hacking Tech., 9 (3): 109-123 (2013)FuncTracker: Discovering Shared Code to Aid Malware Forensics., , , , and . LEET, USENIX Association, (2013)