Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection., , , and . IEEE Trans. Dependable Secur. Comput., 16 (1): 99-112 (2019)Malware detection with quantitative data flow graphs., , and . AsiaCCS, page 271-282. ACM, (2014)Q-Floid: Android Malware detection with Quantitative Data Flow Graphs., , , and . SG-CRC, volume 14 of Cryptology and Information Security Series, page 13-25. IOS Press, (2016)FEEBO: An Empirical Evaluation Framework for Malware Behavior Obfuscation., , , , and . CoRR, (2015)DAVAST: data-centric system level activity visualization., , and . VizSEC, page 25-32. ACM, (2014)Behavior-based Malware Detection with Quantitative Data Flow Analysis.. Technical University Munich, Germany, (2016)A framework for empirical evaluation of malware detection resilience against behavior obfuscation., , , , , and . MALWARE, page 40-47. IEEE Computer Society, (2015)MalFlow: identification of C&C servers through host-based data flow profiling., , , , , and . SAC, page 2087-2094. ACM, (2016)Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics., , and . DIMVA, volume 9148 of Lecture Notes in Computer Science, page 98-118. Springer, (2015)Data Loss Prevention Based on Data-Driven Usage Control., and . ISSRE, page 151-160. IEEE Computer Society, (2012)