Author of the publication

A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory.

, , , and . IEEE Symposium on Security and Privacy Workshops, page 323-328. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blinded random corruption attacks., and . HOST, page 85-90. IEEE Computer Society, (2016)A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory., , , and . IEEE Symposium on Security and Privacy Workshops, page 323-328. IEEE Computer Society, (2018)Towards a Web Application Attack Detection System Based on Network Traffic and Log Classification., , and . ENASE, page 692-699. SCITEPRESS, (2024)Sistema de Recomendação para apoio à colaboração em ambientes baseados em conhecimento., , , , , , , , , and . SBSI, page 111-118. (2004)Fastnews: Selective Clipping of Web Information., , and . ICEIS (4), page 451-454. (2004)Architecture for automation of malware analysis., and . MALWARE, page 106-112. IEEE Computer Society, (2010)Distributed malware analysis scheduling., and . MALWARE, page 34-41. IEEE Computer Society, (2011)Efficient BSP/CGM Algorithms for the Maximum Subsequence Sum and Related Problems1., , , , , , and . ICCS, volume 51 of Procedia Computer Science, page 2754-2758. Elsevier, (2015)Efficient BSP/CGM Algorithms for the Maximum Subarray Sum and Related Problems., , and . ICCSA (1), volume 9155 of Lecture Notes in Computer Science, page 392-407. Springer, (2015)Streamed analysis of network files to avoid false positives and to detect client-side attacks., and . Int. J. Commun. Networks Inf. Secur., (2010)