Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BinGo: cross-architecture cross-OS binary search., , , , , and . SIGSOFT FSE, page 678-689. ACM, (2016)Detection and classification of malicious JavaScript via attack behavior modelling., , , , , and . ISSTA, page 48-59. ACM, (2015)A multi-view context-aware approach to Android malware detection and malicious code localization., , , and . Empir. Softw. Eng., 23 (3): 1222-1274 (2018)A scalable approach for malware detection through bounded feature space behavior modeling., , , , and . ASE, page 312-322. IEEE, (2013)Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation., , , , and . COMPSAC Workshops, page 559-564. IEEE Computer Society, (2012)Application of Multi-objective Bee Colony Optimization Algorithm to Automated Red Teaming., , and . WSC, page 1798-1808. IEEE, (2009)graph2vec: Learning Distributed Representations of Graphs., , , , , and . CoRR, (2017)Scalable analysis for malware and vulnerability detection in binaries. Nanyang Technological University, Singapore, (2018)Evolutionary design of agent-based simulation experiments., , , , , and . AAMAS, page 1321-1322. IFAAMAS, (2011)Evolvable simulations applied to Automated Red Teaming: A preliminary study., , , and . WSC, page 1444-1455. IEEE, (2010)