Author of the publication

MalXCap: A Method for Malware Capability Extraction.

, , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 230-249. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evading malware classifiers using RL agent with action-mask., , , and . Int. J. Inf. Sec., 22 (6): 1743-1763 (December 2023)Towards refinement types for time-dependent data-flow networks., , and . MEMOCODE, page 36-41. IEEE, (2015)Storage efficient blockchain models for constrained applications., , , and . Clust. Comput., 26 (4): 2163-2181 (August 2023)TrustSim: A Decentralized Reputation and Trust Model Simulator., , and . BCCA, page 181-188. IEEE, (2022)A Storage Efficient Blockchain Model for Constrained Applications., , , and . BCCA, page 73-80. IEEE, (2021)Automated Security Audit Testbed For IP-Based IoT Devices Without Physical Access., , , , , and . IOTSMS, page 96-103. IEEE, (2023)MalXCap: A Method for Malware Capability Extraction., , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 230-249. Springer, (2023)Malware Classification Using Image Representation., , , and . CSCML, volume 11527 of Lecture Notes in Computer Science, page 75-92. Springer, (2019)PeerClear: Peer-to-Peer Bot-net Detection., , , and . CSCML, volume 11527 of Lecture Notes in Computer Science, page 279-295. Springer, (2019)Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain., , and . CoRR, (2021)