Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Drive-By Download Attacks: Challenges and Open Problems., , and . iNetSeC, volume 309 of IFIP Advances in Information and Communication Technology, page 52-62. Springer, (2009)A Static, Packer-Agnostic Filter to Detect Similar Malware Samples., , , , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 102-122. Springer, (2012)A layout-similarity-based approach for detecting phishing pages., , , and . SecureComm, page 454-463. IEEE, (2007)Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode., , and . RAID, volume 6961 of Lecture Notes in Computer Science, page 61-80. Springer, (2011)Effective and Efficient Malware Detection at the End Host., , , , , and . USENIX Security Symposium, page 351-366. USENIX Association, (2009)Nexat: a history-based approach to predict attacker actions., , , , and . ACSAC, page 383-392. ACM, (2011)Extracting probable command and control signatures for detecting botnets., , , and . SAC, page 1657-1662. ACM, (2014)POISED: Spotting Twitter Spam Off the Beaten Paths., , , , , , , and . CCS, page 1159-1174. ACM, (2017)A solution for the automated detection of clickjacking attacks., , , , and . AsiaCCS, page 135-144. ACM, (2010)Broken Fingers: On the Usage of the Fingerprint API in Android., , , , , , and . NDSS, The Internet Society, (2018)