Search for persons
X
?
E-Business and Telecommunications; Communications in Computer and Information Science ,
5
Explaining the Use of Cryptographic API in Android Malware:
, In:
?
Explainable Deep Learning AI ,
6
Improving malware detection with explainable machine learni..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
7
Extended Abstract: Effective Call Graph Fingerprinting for ..:
, In:
?
8
Detection of Intrusions and Malware, and Vulnerability Asse..
Lecture Notes in Computer Science, 13358
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
9
Reach Me if You Can: On Native Vulnerability Reachability i..:
, In:
?
Pattern Recognition. ICPR International Workshops and Challenges; Lecture Notes in Computer Science ,
10
Explanation-Driven Characterization of Android Ransomware:
, In:
?
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
12