Personensuche
X
?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy ,
1
Mining Attributed Graphs for Threat Intelligence:
, In:
?
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security ,
3
Chucky : exposing missing checks in source code for vuln..:
, In:
?
Proceedings of the 2013 ACM workshop on Artificial intelligence and security ,
4
Structural detection of android malware using embedded call..:
, In:
?
Proceedings of the 5th ACM workshop on Security and artificial intelligence ,
5