Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Performance random data lookup for network processing., , , and . SoCC, page 272-277. IEEE, (2010)PageRank in malware categorization., , , and . RACS, page 291-295. ACM, (2015)N-opcode analysis for android malware classification and categorization., , , and . Cyber Security And Protection Of Digital Services, page 1-7. IEEE, (2016)Classification of P2P and HTTP Using Specific Protocol Characteristics., , and . EUNICE, volume 5733 of Lecture Notes in Computer Science, page 31-40. Springer, (2009)Low power Gm-boosted differential Colpitts VCO., , , , , and . SoCC, page 247-250. IEEE, (2011)OSCIDS: An Ontology based SCADA Intrusion Detection Framework., , and . SECRYPT, page 327-335. SciTePress, (2016)Detecting packed executables using steganalysis., , , and . EUVIP, page 1-5. IEEE, (2014)Quality of service analysis of a wireless ATM network access point., , , and . ICC, page 226-230. IEEE, (1999)EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning., , and . IWSPA@CODASPY, page 65-72. ACM, (2017)DEV-PIM: Dynamic Execution Validation with Processing-in-Memory., , , , , and . ETS, page 1-6. IEEE, (2023)