Gascon, Hugo
177  Ergebnisse:
Personensuche X
?
1

TypeMiner: Recovering Types in Binary Programs Using Machin..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
 
?
2

Reading Between the Lines: Content-Agnostic Detection of Sp..:

, In: Research in Attacks, Intrusions, and Defenses; Lecture Notes in Computer Science,
 
?
3

Mining Attributed Graphs for Threat Intelligence:

, In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy,
Gascon, Hugo ; Grobauer, Bernd ; Schreck, Thomas... - p. 15-22 , 2017
 
?
4

Fingerprinting Mobile Devices Using Personalized Configurat..:

Kurtz, Andreas ; Gascon, Hugo ; Becker, Tobias..
Proceedings on Privacy Enhancing Technologies.  2016 (2015)  1 - p. 4-19 , 2015
 
?
5

Chucky : exposing missing checks in source code for vuln..:

, In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security,
 
?
6

Structural detection of android malware using embedded call..:

, In: Proceedings of the 2013 ACM workshop on Artificial intelligence and security,
Gascon, Hugo ; Yamaguchi, Fabian ; Arp, Daniel. - p. 45-54 , 2013
 
?
7

Learning stateful models for network honeypots:

, In: Proceedings of the 5th ACM workshop on Security and artificial intelligence,
 
?
 
1-15