Author of the publication

Use-case-specific metrics for comparative testing of endpoint security products.

, and . MALWARE, page 35-40. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Component protection metrics for security product development: I. AV-TEST Full Product Tests., , and . MALWARE, page 54-61. IEEE Computer Society, (2012)Measuring the effectiveness of modern security products to detect and contain emerging threats - A consensus-based approach., , , , , and . MALWARE, page 27-34. IEEE Computer Society, (2013)For cloud services on a user's multiple devices, how do we measure the trusted zone defended by anti-malware?, , and . CyberSA, page 1-5. IEEE, (2017)Segmented sandboxing - A novel approach to Malware polymorphism detection., , and . MALWARE, page 59-68. IEEE, (2015)Protection against remote code execution exploits of popular applications in Windows., , and . MALWARE, page 26-31. IEEE Computer Society, (2014)Measuring cloud-based anti-malware protection for office 365 user accounts., , and . CyberSA, page 1-7. IEEE, (2017)Cluster analysis for deobfuscation of malware variants during ransomware attacks., , , and . CyberSA, page 1-9. IEEE, (2018)Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud., , and . MALWARE, page 40-49. IEEE, (2014)Use-case-specific metrics for comparative testing of endpoint security products., and . MALWARE, page 35-40. IEEE Computer Society, (2013)