Author of the publication

A Survey of Game Theoretic Methods for Cyber Security.

, , , , and . DSC, page 631-636. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DSmith: Compiler Fuzzing through Generative Deep Learning Model with Attention., , , , and . IJCNN, page 1-9. IEEE, (2020)End-to-End Multi-Tab Website Fingerprinting Attack: A Detection Perspective., , , , , and . CoRR, (2022)Mining Network Behavior Specifications of Malware Based on Binary Analysis., , , , and . ICoC, volume 401 of Communications in Computer and Information Science, page 248-255. Springer, (2013)Using a Fine-Grained Hybrid Feature for Malware Similarity Analysis., , , and . CSA/CUTE, volume 421 of Lecture Notes in Electrical Engineering, page 54-60. Springer, (2016)Malware Similarity Analysis Based on Graph Similarity Flooding Algorithm., , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 31-37. Springer, (2015)Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing., , , and . Wireless Personal Communications, 75 (3): 1591-1609 (2014)AT-ROP: Using static analysis and binary patch technology to defend against ROP attacks based on return instruction., , and . TASE, page 209-216. IEEE, (2020)A binary analysis method for protocol deviation discovery from implementations., , and . ICOIN, page 670-675. IEEE Computer Society, (2013)Tree2tree Structural Language Modeling for Compiler Fuzzing., , , , , and . ICA3PP (1), volume 12452 of Lecture Notes in Computer Science, page 563-578. Springer, (2020)A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering., , , and . Sensors, 19 (3): 716 (2019)