Author of the publication

Phishing page detection via learning classifiers from page layout feature.

, , , , , , and . EURASIP J. Wireless Comm. and Networking, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports., , , and . CoRR, (2021)PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability., , and . CCS, page 3135-3149. ACM, (2022)Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations., , , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 418-435. Springer, (2012)One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics., , , , , and . NDSS, The Internet Society, (2019)AirBag: Boosting Smartphone Resistance to Malware Infection., , , , and . NDSS, The Internet Society, (2014)Monet: A User-oriented Behavior-based Malware Variants Detection System for Android., , , , and . CoRR, (2016)Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 161-181. Springer, (2009)Robust P2P Primitives Using SGX Enclaves., , , , , and . ICDCS, page 1185-1186. IEEE, (2020)Towards Practical Automatic Generation of Multipath Vulnerability Signatures, , , and . CMU-CS-07-150. School of Computer Science, Carnegie Mellon University, (2007)Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems., , and . USENIX Annual Technical Conference, General Track, page 375-378. USENIX, (2005)