Author of the publication

Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering.

, and . ICISSP, page 635-644. SciTePress, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designs, Intersecting Families, and Weight of Boolean Functions.. IMACC, volume 1746 of Lecture Notes in Computer Science, page 70-80. Springer, (1999)Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions, , and . CoRR, (2009)The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes., , and . J. Comput. Virol. Hacking Tech., 17 (3): 199-220 (2021)Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language., , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 81-100. Springer, (2009)Optimization of Operational Large-Scale (Cyber) Attacks by a Combinational Approach., and . Int. J. Cyber Warf. Terror., 7 (3): 29-43 (2017)Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering., and . ICISSP, page 635-644. SciTePress, (2019)Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity., and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 475-488. Springer, (1998)Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher., and . ICISSP, page 622-631. SciTePress, (2017)A New Ultrafast Stream Cipher Design: COS Ciphers., and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 85-98. Springer, (2001)Structural analysis of binary executable headers for malware detection optimization., , and . J. Comput. Virol. Hacking Tech., 13 (2): 87-93 (2017)