Author of the publication

AMSI-Based Detection of Malicious PowerShell Code Using Contextual Embeddings.

, , and . AsiaCCS, page 679-693. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Malicious PowerShell Scripts Using Contextual Embeddings., , and . CoRR, (2019)Modeling infection methods of computer malware in the presence of vaccinations using epidemiological models: An analysis of real-world data., , and . CoRR, (2019)On the economic effects of the text completion interface: empirical analysis of financial markets., and . Electron. Mark., 31 (3): 717-735 (2021)An efficient generalized shift-rule for the prefer-max De Bruijn sequence., and . Discret. Math., 343 (2): 111657 (2020)An efficient shift rule for the prefer-max De Bruijn sequence., , , , , and . Discret. Math., 342 (1): 226-232 (2019)Detection of malicious webmail attachments based on propagation patterns., , and . Knowl. Based Syst., (2018)AMSI-Based Detection of Malicious PowerShell Code Using Contextual Embeddings., , and . AsiaCCS, page 679-693. ACM, (2020)Modeling infection methods of computer malware in the presence of vaccinations using epidemiological models: an analysis of real-world data., , and . Int. J. Data Sci. Anal., 10 (4): 349-358 (2020)Detecting Malicious PowerShell Commands using Deep Neural Networks., , and . AsiaCCS, page 187-197. ACM, (2018)Contention Detection and Resolution for Multiple-Access Power-Line Communications., and . IEEE Trans. Vehicular Technology, 56 (6): 3879-3887 (2007)