Author of the publication

Towards time evolved malware identification using two-head neural network.

, , , , , and . J. Inf. Secur. Appl., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services., , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (1): 125-138 (January 2024)PEDA: Comprehensive Damage Assessment for Production Environment Server Systems., , , and . IEEE Trans. Inf. Forensics Secur., 6 (4): 1323-1334 (2011)Towards time evolved malware identification using two-head neural network., , , , , and . J. Inf. Secur. Appl., (2022)CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds., , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 665-677. Springer, (2017)Value-based program characterization and its application to software plagiarism detection., , , , , and . ICSE, page 756-765. ACM, (2011)An Online Approach to Defeating Return-Oriented-Programming Attacks., , , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 236-247. Springer, (2017)A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning., , , and . IEEE Access, (2019)KEcruiser: A novel control flow protection for kernel extensions., , , and . Future Gener. Comput. Syst., (2019)EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave., , , and . TrustCom, page 225-232. IEEE, (2022)Protecting Virtual Machines against Untrusted Hypervisor on ARM64 Cloud Platform., , and . ICC, page 5451-5456. IEEE, (2022)