From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode., , и . ICISSP, стр. 346-353. SciTePress, (2017)TAON: an ontology-based approach to mitigating targeted attacks., , и . iiWAS, стр. 303-312. ACM, (2016)Classifying malicious system behavior using event propagation trees., , , и . iiWAS, стр. 23:1-23:10. ACM, (2015)Advanced threat intelligence: interpretation of anomalous behavior in ubiquitous kernel processes.. De Montfort University, Leicester, UK, (2019)British Library, EThOS.Sequitur-based Inference and Analysis Framework for Malicious System Behavior., , , и . ICISSP, стр. 632-643. SciTePress, (2017)The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns., , , , , , и . ARES, стр. 18:1-18:10. ACM, (2018)LLR-Based Sentiment Analysis for Kernel Event Sequences., , и . AINA, стр. 764-771. IEEE Computer Society, (2017)Empirical Malware Research through Observation of System Behaviour., , , и . WWW (Companion Volume), стр. 467-469. ACM, (2016)Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis., , , , , , и . VizSEC, стр. 9-16. ACM, (2014)Endpoint Data Classification Using Markov Chains., , и . ICSSA, стр. 56-59. IEEE, (2017)