Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Forgetting Using Key Decay., and . SAC, page 34-41. ACM, (2023)Do Bayesian variational autoencoders know what they don't know?, and . UAI, volume 180 of Proceedings of Machine Learning Research, page 718-727. PMLR, (2022)Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic., , , and . ISC, volume 13118 of Lecture Notes in Computer Science, page 259-278. Springer, (2021)Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks., and . PST, page 355-364. IEEE Computer Society, (2017)Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection., , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 263-277. Springer, (2018)Detecting and categorizing Android malware with graph neural networks., , and . SAC, page 409-412. ACM, (2021)HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs., , , and . ICANN (3), volume 12893 of Lecture Notes in Computer Science, page 127-138. Springer, (2021)White paper on cybersecurity in the healthcare sector. The HEIR solution., , , , , , , , , and 22 other author(s). CoRR, (2023)Free Willy: Prune System Calls to Enhance Software Security., , and . SAC, page 1522-1529. ACM, (2023)The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security.. ICCST, page 1-6. IEEE, (2014)