Author of the publication

Effective and Efficient Malware Detection at the End Host.

, , , , , and . USENIX Security Symposium, page 351-366. USENIX Association, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rozzle: De-cloaking Internet Malware., , , and . IEEE Symposium on Security and Privacy, page 443-457. IEEE Computer Society, (2012)Removing web spam links from search engine results., , and . J. Comput. Virol., 7 (1): 51-62 (2011)Identifying Dormant Functionality in Malware Programs., , , , , and . IEEE Symposium on Security and Privacy, page 61-76. IEEE Computer Society, (2010)Detecting Environment-Sensitive Malware., , and . RAID, volume 6961 of Lecture Notes in Computer Science, page 338-357. Springer, (2011)Effective and Efficient Malware Detection at the End Host., , , , , and . USENIX Security Symposium, page 351-366. USENIX Association, (2009)The power of procrastination: detection and mitigation of execution-stalling malicious code., , and . ACM Conference on Computer and Communications Security, page 285-296. ACM, (2011)