From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Collective Classification for Packed Executable Identification., , , , и . Comput. Syst. Sci. Eng., (2013)Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem., , , , и . NDSS, The Internet Society, (2020)Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land., , , , и . SP, стр. 1557-1574. IEEE, (2021)Structural Feature Based Anomaly Detection for Packed Executable Identification., , и . CISIS, том 6694 из Lecture Notes in Computer Science, стр. 230-237. Springer, (2011)Tracking Users Like There is No Tomorrow: Privacy on the Current Internet., , , и . CISIS-ICEUTE, том 369 из Advances in Intelligent Systems and Computing, стр. 473-483. Springer, (2015)Spam Filtering through Anomaly Detection., , , , и . ICETE (Selected Papers), том 314 из Communications in Computer and Information Science, стр. 203-216. Springer, (2011)Supervised classification of packets coming from a HTTP botnet., , , , , и . CLEI, стр. 1-8. IEEE, (2012)Instance-based Anomaly Method for Android Malware Detection., , , , , и . SECRYPT, стр. 387-394. SciTePress, (2013)Optimized Data-Flow Integrity for Modern Compilers., , и . IEEE Access, (2024)On the study of anomaly-based spam filtering using spam as representation of normality., , , , , и . CCNC, стр. 693-695. IEEE, (2012)