Author of the publication

Detecting Malware Based on Dynamic Analysis Techniques Using Deep Graph Learning.

, , , , and . FDSE, volume 12466 of Lecture Notes in Computer Science, page 357-378. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dangling references in multi-configuration and dynamic PHP-based Web applications., , , , and . ASE, page 399-409. IEEE, (2013)After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities, and Fixes, , and . Proceedings of the Third International Conference on Engineering secure software and systems, page 195--208. (February 2011)An automatic method for assessing the versions affected by a vulnerability., , and . Empir. Softw. Eng., 21 (6): 2268-2297 (2016)Detection of embedded code smells in dynamic web applications., , , , and . ASE, page 282-285. ACM, (2012)Dynamic Intelligent MAC Protocol for Metropolitan Optical Packet Switching Ring Networks., and . ICC, page 2661-2668. IEEE, (2006)On the linear description of the 3-cycle polytope., and . Eur. J. Oper. Res., 137 (2): 310-325 (2002)On the Convex Hull of Huffman Trees., , and . Electron. Notes Discret. Math., (2010)Irregular Convolution and Unity-Rate Coded Network-Coding for Cooperative Multi-User Communications., , and . IEEE Trans. Wirel. Commun., 12 (3): 1231-1243 (2013)On the star forest polytope for trees and cycles., , , , and . RAIRO Oper. Res., 53 (5): 1763-1773 (2019)A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases., and . J. Softw., 3 (4): 9-16 (2008)