Personensuche
X
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
1
TypeMiner: Recovering Types in Binary Programs Using Machin..:
, In:
?
Research in Attacks, Intrusions, and Defenses; Lecture Notes in Computer Science ,
2
Reading Between the Lines: Content-Agnostic Detection of Sp..:
, In:
?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy ,
3
Mining Attributed Graphs for Threat Intelligence:
, In:
?
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security ,
5
Chucky : exposing missing checks in source code for vuln..:
, In:
?
Proceedings of the 2013 ACM workshop on Artificial intelligence and security ,
6
Structural detection of android malware using embedded call..:
, In:
?
Proceedings of the 5th ACM workshop on Security and artificial intelligence ,
7