Search for persons
X
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
3
Tactics, Techniques and Procedures of Cybercrime: A Methodo..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
4
RTR-Shield: Early Detection of Ransomware Using Registry an..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks ,
5
A Generalized Unknown Malware Classification:
, In:
?
2023 IEEE International Conference on Cyber Security and Resilience (CSR) ,
6
Ransomware Detection based on Network Behavior using Machin..:
, In:
?
2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) ,
9
Monitoring Application Behaviours to Detect Android Malware:
, In:
?
Silicon Valley Cybersecurity Conference; Communications in Computer and Information Science ,
10
Automated Flag Detection and Participant Performance Evalua..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
11
RBMon: Real Time System Behavior Monitoring Tool:
, In:
?
2022 10th International Symposium on Digital Forensics and Security (ISDFS) ,
13
DOTMUG: A Threat Model for Target Specific APT Attacks–Misu..:
, In:
?
2022 IEEE International Conference on Cyber Security and Resilience (CSR) ,
14