From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Static, Packer-Agnostic Filter to Detect Similar Malware Samples., , , , и . DIMVA, том 7591 из Lecture Notes in Computer Science, стр. 102-122. Springer, (2012)Merged MSG and EPS land surface albedo products in the frame of the LSA SAF project: Method and validation over Europe., , , , и . IGARSS, стр. 4525-4527. IEEE, (2016)EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services., , , , , и . USENIX Security Symposium, стр. 563-578. USENIX Association, (2015)Formalization of malware through process calculi, , и . CoRR, (2009)Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation., , и . MMM-ACNS, том 7531 из Lecture Notes in Computer Science, стр. 203-217. Springer, (2012)Attack Volume Model: Geometrical Approach and Application., , и . CRiSIS, том 9572 из Lecture Notes in Computer Science, стр. 242-257. Springer, (2015)Formalization of Viruses and Malware Through Process Algebras., , и . ARES, стр. 597-602. IEEE Computer Society, (2010)PUBCRAWL: Protecting Users and Businesses from CRAWLers., , , и . USENIX Security Symposium, стр. 507-522. USENIX Association, (2012)Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language., , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 81-100. Springer, (2009)Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions, , и . CoRR, (2009)