Author of the publication

A taint based approach for automatic reverse engineering of gray-box file formats.

, , , and . Soft Comput., 20 (9): 3563-3578 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uploading Deferrable Big Data to the Cloud by Improved Dynamic Self-Adaption Algorithm., , , and . 3PGCIC, page 116-120. IEEE Computer Society, (2015)Improved traffic detection with support vector machine based on restricted Boltzmann machine., , , and . Soft Comput., 21 (11): 3101-3112 (2017)A Security Vulnerability Threat Classification Method., , , , and . BWCCA, volume 12 of Lecture Notes on Data Engineering and Communications Technologies, page 414-426. Springer, (2017)OpenSSL HeartBleed: Security Management of Implements of Basic Protocols., , , , and . 3PGCIC, page 520-524. IEEE Computer Society, (2014)Homology Detection Based on Abstract Syntax Tree Combined Simple Semantics Analysis., , , , and . Web Intelligence/IAT Workshops, page 410-414. IEEE Computer Society, (2010)978-0-7695-4191-4.A Novel Algorithm for Feature Selection Used in Intrusion Detection., , and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 967-974. Springer, (2017)WhirlingFuzzwork: a taint-analysis-based API in-memory fuzzing framework., , , and . Soft Comput., 21 (12): 3401-3414 (2017)Survey of Cyberspace Resources Scanning and Analyzing., , , , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 279-291. Springer, (2020)Modeling and Analysis of Cyberspace Threat Sources Based on Vulnerabilities., , , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 292-303. Springer, (2020)Synthesis Algorithm of Homologous Detection Based on Analytic Hierarchy Process., , , , and . CIS, page 826-830. IEEE Computer Society, (2011)