Author of the publication

Distributed Evasive Scan Techniques and Countermeasures.

, , and . DIMVA, volume 4579 of Lecture Notes in Computer Science, page 157-174. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 161-181. Springer, (2009)Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance., , , , , , , and . CCS, page 60-74. ACM, (2023)AVclass: A Tool for Massive Malware Labeling., , , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 230-253. Springer, (2016)A Deep Dive into the VirusTotal File Feed., , , and . DIMVA, volume 13959 of Lecture Notes in Computer Science, page 155-176. Springer, (2023)Certified PUP: Abuse in Authenticode Code Signing., , , and . CCS, page 465-478. ACM, (2015)BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering., , , , , and . AsiaCCS, page 393-398. ACM, (2018)Measuring Pay-per-Install: The Commoditization of Malware Distribution., , , and . USENIX Security Symposium, USENIX Association, (2011)Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering., , , and . ACM Conference on Computer and Communications Security, page 621-634. ACM, (2009)Costly freeware: a systematic analysis of abuse in download portals., , , and . IET Inf. Secur., 13 (1): 27-35 (2019)Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services., , and . USENIX Security Symposium, page 739-756. USENIX Association, (2016)