From post

AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection.

, , , , , , , и . SciSec, том 14299 из Lecture Notes in Computer Science, стр. 207-224. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning., , и . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, стр. 1841-1847. IEEE, (2022)Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity., , и . IEEE Trans. Dependable Secur. Comput., 19 (6): 3804-3821 (2022)Optimal strategy selection for attack graph games using deep reinforcement learning., , и . HPCC/DSS/SmartCity/DependSys, стр. 823-830. IEEE, (2022)Theoretical Convergence Guaranteed Resource-Adaptive Federated Learning with Mixed Heterogeneity., , , , , , , и . KDD, стр. 2444-2455. ACM, (2023)Simulations of Event-Based Cyber Dynamics via Adversarial Machine Learning., , , и . SciSec, том 13005 из Lecture Notes in Computer Science, стр. 187-201. Springer, (2021)Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy., , и . SciSec, том 14299 из Lecture Notes in Computer Science, стр. 42-59. Springer, (2023)AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection., , , , , , , и . SciSec, том 14299 из Lecture Notes in Computer Science, стр. 207-224. Springer, (2023)Optimal Defense Strategy for Multi-agents Using Value Decomposition Networks., , , и . ICIC (2), том 14863 из Lecture Notes in Computer Science, стр. 504-516. Springer, (2024)Stories behind decisions: Towards interpretable malware family classification with hierarchical attention., , , , , , , и . Comput. Secur., (2024)Improved Approach of Genetic Programming and Applications for Data Mining., и . ICNC (1), том 4221 из Lecture Notes in Computer Science, стр. 816-819. Springer, (2006)