Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode., , and . ICISSP, page 346-353. SciTePress, (2017)FLASH: Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage & Its Security and Privacy Implications., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 9 (4): 26-40 (2018)TAON: an ontology-based approach to mitigating targeted attacks., , and . iiWAS, page 303-312. ACM, (2016)Classifying malicious system behavior using event propagation trees., , , and . iiWAS, page 23:1-23:10. ACM, (2015)Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam., , and . J. Cyber Secur. Mobil., 9 (2): 265-300 (2020)Advanced threat intelligence: detection and classification of anomalous behavior in system processes., and . Elektrotech. Informationstechnik, 137 (1): 38-44 (2020)Evaluation Methodologies in Software Protection Research., , , and . CoRR, (2023)Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation., , , , , and . NordSec, volume 13700 of Lecture Notes in Computer Science, page 273-291. Springer, (2022)Real-Time Forensics Through Endpoint Visibility., , , , and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 18-32. Springer, (2017)Creation and Integration of Remote High Interaction Honeypots., , , and . ICSSA, page 50-55. IEEE, (2017)