From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph., , , , и . CoRR, (2016)POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification., , и . ACM Conference on Computer and Communications Security, стр. 1478-1480. ACM, (2014)Distributed and reliable decision-making for cloud-enabled mobile service platforms., и . IJDSN, (2017)AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification., и . WISA, том 8909 из Lecture Notes in Computer Science, стр. 107-121. Springer, (2014)ADAM: Automated Detection and Attribution of Malicious Webpages., , , , и . WISA, том 8909 из Lecture Notes in Computer Science, стр. 3-16. Springer, (2014)Examining Adversarial Learning against Graph-based IoT Malware Detection Systems., , , , , , и . CoRR, (2019)Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets., , , , , , и . DSC, стр. 1-8. IEEE, (2019)Keylogging-Resistant Visual Authentication Protocols., , и . IEEE Trans. Mob. Comput., 13 (11): 2566-2579 (2014)Private Over-Threshold Aggregation Protocols over Distributed Datasets., , , и . IEEE Trans. Knowl. Data Eng., 28 (9): 2467-2479 (2016)A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain., , и . TrustBus, том 8647 из Lecture Notes in Computer Science, стр. 72-82. Springer, (2014)