From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deployable Classifiers for Malware Detection., , , и . ICISTM, том 285 из Communications in Computer and Information Science, стр. 384-395. Springer, (2012)A transformation-based model of malware derivation., и . MALWARE, стр. 17-25. IEEE Computer Society, (2012)Adversarial Variational Modality Reconstruction and Regularization for Zero-Day Malware Variants Similarity Detection., , , , , и . ICDM, стр. 1131-1136. IEEE, (2022)Observing and Measuring Cognitive Support: Steps Toward Systematic Tool Evaluation and Engineering.. IWPC, стр. 185-195. IEEE Computer Society, (2003)Towards a Clone Detection Benchmark Suite and Results Archive., , , и . IWPC, стр. 285-287. IEEE Computer Society, (2003)Cognitive Support in Software Engineering Tools: A Distributed Cognition Framework. Simon Fraser University, Canada, (2002)Generative modeling games for exploratory industry-academic research., и . CESSER-IP@ICSE, стр. 18-21. IEEE / ACM, (2019)HASTI: A Lightweight Framework for Cognitive Reengineering Analysis.. PPIG, стр. 21. Psychology of Programming Interest Group, (2002)Normalizing Metamorphic Malware Using Term Rewriting., , , и . SCAM, стр. 75-84. IEEE Computer Society, (2006)Risk-Aware Fine-Grained Access Control in Cyber-Physical Contexts., , , , , и . CoRR, (2021)