From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Source Code Authorship Attribution Using Long Short-Term Memory Based Networks., , , , и . ESORICS (1), том 10492 из Lecture Notes in Computer Science, стр. 65-82. Springer, (2017)Exploring Paraphrasing Techniques on Formal Language for Generating Semantics Preserving Source Code Transformations., , , и . ICSC, стр. 242-248. IEEE, (2020)System Call-Based Detection of Malicious Processes., , и . QRS, стр. 119-124. IEEE, (2015)Malware Anomaly Detection on Virtual Assistants., , , , и . MALWARE, стр. 124-131. IEEE, (2018)Simulation of Attacker Defender Interaction in a Noisy Security Game., , , и . CoRR, (2022)Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem., , и . GameSec, том 13061 из Lecture Notes in Computer Science, стр. 354-364. Springer, (2021)Demonstration of COSAK static analysis tools., , , и . DISCEX (2), стр. 7-9. IEEE Computer Society, (2003)System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection., , , , и . UbiSec, том 1768 из Communications in Computer and Information Science, стр. 103-115. Springer, (2022)Workshop on Code Based Software Security Assessments (CoBaSSA 2005)., и . WCRE, стр. 233. IEEE Computer Society, (2005)Behavioral anomaly detection of malware on home routers., , , , , и . MALWARE, стр. 47-54. IEEE Computer Society, (2017)