Author of the publication

Correlating file-based malware graphs against the empirical ground truth of DNS graphs.

, , , , , and . ECSA Workshops, page 30. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Object-Oriented Design Pattern: Access Protector., and . Software Engineering Research and Practice, page 230-236. CSREA Press, (2009)Resource allocation methodology for the segmented bus platform., , , and . SoCC, page 129-132. IEEE, (2005)Compiler assisted dynamic allocation of finite hardware acceleration resources for parallel tasks., , and . CompSysTech, page 49-56. ACM, (2016)Processos e Práticas Ágeis Sensíveis à Dívida Técnica - Comparação dos Resultados de um Survey Executado no Brasil, Finlândia e Nova Zelândia., , , , , , , , and . AMCIS, Association for Information Systems, (2019)Network Science, Homophily and Who Reviews Who in the Linux Kernel?, , and . CoRR, (2021)Applying Internal Interface Diversification to IoT Operating Systems., , and . ICSSA, page 1-5. IEEE, (2016)Privacy in Popular Children's Mobile Applications: A Network Traffic Analysis., , , , and . MIPRO, page 1213-1218. IEEE, (2023)An interface diversified honeypot for malware analysis., , and . ECSA Workshops, page 29. ACM, (2016)Accounting testing in software cost estimation: A case study of the current practice and impacts., , and . SPLST, volume 1525 of CEUR Workshop Proceedings, page 61-75. CEUR-WS.org, (2015)Mining social networks of open source CVE coordination., , , and . IWSM-Mensura, page 176-188. ACM, (2017)