From post

Automated Log Analysis of Infected Windows OS Using Mechanized Reasoning.

. ICONIP (2), том 5864 из Lecture Notes in Computer Science, стр. 540-547. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection, и . Cryptology and Network Security, том 3810 из Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 10.1007/11599371_8.(2005)Faster Parameter Detection of Polymorphic Viral Code Using Hot List Strategy.. ICONIP (1), том 5506 из Lecture Notes in Computer Science, стр. 555-562. Springer, (2008)Automated Log Analysis of Infected Windows OS Using Mechanized Reasoning.. ICONIP (2), том 5864 из Lecture Notes in Computer Science, стр. 540-547. Springer, (2009)Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection., , и . NTMS, стр. 1-6. IEEE, (2011)Log Analysis of Exploitation in Cloud Computing Environment Using Automated Reasoning., , и . ICONIP (2), том 6444 из Lecture Notes in Computer Science, стр. 337-343. Springer, (2010)Practical network traffic analysis in P2P environment., , , , и . IWCMC, стр. 1801-1807. IEEE, (2011)A new perspective of paramodulation complexity by solving massive 8 puzzles., и . CoRR, (2020)Hardening Botnet by a Rational Botmaster., , и . Inscrypt, том 5487 из Lecture Notes in Computer Science, стр. 348-369. Springer, (2008)Flaw and Configuration Analysis of Cloud Component Using First Order Logic.. AsiaJCIS, стр. 104-108. IEEE Computer Society, (2012)Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection., и . CANS, том 3810 из Lecture Notes in Computer Science, стр. 85-95. Springer, (2005)