Author of the publication

Exploring Multiple Execution Paths for Malware Analysis.

, , and . IEEE Symposium on Security and Privacy, page 231-245. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PoX: Protecting users from malicious Facebook applications., , , and . Computer Communications, 35 (12): 1507-1515 (2012)FIRE: FInding Rogue nEtworks., , , , and . ACSAC, page 231-240. IEEE Computer Society, (2009)Hunting in the enterprise: Forensic triage and incident response., and . Digital Investigation, 10 (2): 89-98 (2013)Towards Automated OCT-based Identification of White Brain Matter., , , , and . Bildverarbeitung für die Medizin, page 414-418. Springer, (2007)Limits of Static Analysis for Malware Detection., , and . ACSAC, page 421-430. IEEE Computer Society, (2007)On the Scalability of Genetic Algorithms to Very Large-Scale Feature Selection., and . EvoWorkshops, volume 1803 of Lecture Notes in Computer Science, page 77-86. Springer, (2000)Exploring Multiple Execution Paths for Malware Analysis., , and . IEEE Symposium on Security and Privacy, page 231-245. IEEE Computer Society, (2007)PoX: Protecting users from malicious Facebook applications., , , and . PerCom Workshops, page 288-294. IEEE Computer Society, (2011)Extending the domain of definition of functional series for nonlinear systems.. Automatica, 32 (8): 1233-1234 (1996)Dynamic Analysis of Malicious Code., , , and . Journal in Computer Virology, 2 (1): 67-77 (2006)