From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs., , , и . ICANN (3), том 12893 из Lecture Notes in Computer Science, стр. 127-138. Springer, (2021)Detecting and categorizing Android malware with graph neural networks., , и . SAC, стр. 409-412. ACM, (2021)Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks., и . PST, стр. 355-364. IEEE Computer Society, (2017)Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection., , и . SEC, том 529 из IFIP Advances in Information and Communication Technology, стр. 263-277. Springer, (2018)The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security.. ICCST, стр. 1-6. IEEE, (2014)Can Today's Machine Learning Pass Image-Based Turing Tests?, , и . ISC, том 11723 из Lecture Notes in Computer Science, стр. 129-148. Springer, (2019)Free Willy: Prune System Calls to Enhance Software Security., , и . SAC, стр. 1522-1529. ACM, (2023)White paper on cybersecurity in the healthcare sector. The HEIR solution., , , , , , , , , и 22 other автор(ы). CoRR, (2023)INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain., , , , , и . Int. J. Inf. Sec., 23 (1): 347-371 (февраля 2024)hybrid-Flacon: Hybrid Pattern Malware Detection and Categorization with Network Traffic andProgram Code., , и . CoRR, (2021)