Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Static Verification of Worm and virus Behavior in binary Executables using Model Checking., and . IAW, page 298-300. IEEE, (2003)Debugging program failure exhibited by voluminous data., and . Journal of Software Maintenance, 10 (2): 111-150 (1998)Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281)., , , and . Dagstuhl Reports, 7 (7): 44-53 (2017)Artificial Intelligence Based Malware Analysis., , , , , , , , , and 5 other author(s). CoRR, (2017)Theory and algorithms for slicing unstructured programs., , and . Inf. Softw. Technol., 48 (7): 549-565 (2006)How to Control Unfolding when Specializing Interpreters., and . New Generation Comput., 8 (1): 61-70 (1990)Program Structure-Based Feature Selection for Android Malware Analysis., , and . MobiSec, volume 107 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 51-52. Springer, (2012)Understanding someone else's code: Analysis of experiences.. J. Syst. Softw., 23 (3): 269-275 (1993)CajunBot: Architecture and algorithms., , , , , , and . J. Field Robotics, 23 (8): 555-578 (2006)Game-theoretic design of an information exchange model for detecting packed malware., and . MALWARE, page 1-7. IEEE Computer Society, (2011)