From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Artificial Intelligence Based Malware Analysis., , , , , , , , , и 5 other автор(ы). CoRR, (2017)Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection., , , , , , , , , и 5 other автор(ы). CoRR, (2020)In situ reuse of logically extracted functional components., , и . J. Comput. Virol., 8 (3): 73-84 (2012)Instruction embedding for improved obfuscation., , , и . ACM Southeast Regional Conference, стр. 130-135. ACM, (2012)Identifying Shared Software Components to Support Malware Forensics., , , , , , , и . DIMVA, том 8550 из Lecture Notes in Computer Science, стр. 21-40. Springer, (2014)VILO: a rapid learning nearest-neighbor classifier for malware triage., , , и . J. Comput. Virol. Hacking Tech., 9 (3): 109-123 (2013)An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center., , , , , , , и . iThings/GreenCom/CPSCom/SmartData/Cybermatics, стр. 634-641. IEEE, (2020)FuncTracker: Discovering Shared Code to Aid Malware Forensics., , , , и . LEET, USENIX Association, (2013)