Search for persons
X
?
Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science ,
1
Modeling Obfuscation Stealth Through Code Complexity:
, In:
?
Secure IT Systems; Lecture Notes in Computer Science ,
4
Obfuscation-Resilient Semantic Functionality Identification..:
, In:
?
2022 IEEE Global Engineering Education Conference (EDUCON) ,
5
PenQuest Reloaded: A Digital Cyber Defense Game for Technic..:
, In:
?
Proceedings of the 16th International Conference on Availability, Reliability and Security ,
6
SoK: Automatic Deobfuscation of Virtualization-protected Ap..:
, In:
?
2019 International Conference on Software Security and Assurance (ICSSA) ,
11
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Nav..:
, In:
?
Proceedings of the 14th International Conference on Availability, Reliability and Security ,
13
Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs:
, In:
?
2019 International Conference on Software Security and Assurance (ICSSA) ,
14
Assessment of the Transparency of the Windows Subsystem for..:
, In:
?
2019 International Conference on Software Security and Assurance (ICSSA) ,
15