Author of the publication

Learning and Classification of Malware Behavior.

, , , , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 108-125. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security analysis of online centroid anomaly detection., and . J. Mach. Learn. Res., (2012)Recognition approach to gesture language understanding., , , , and . ICPR, page 431-435. IEEE Computer Society, (1996)Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371)., , , , and . Dagstuhl Manifestos, 3 (1): 1-30 (2013)Hidost: a static machine-learning-based detector of malicious files., and . EURASIP J. Information Security, (2016)Evasion Attacks against Machine Learning at Test Time., , , , , , , and . CoRR, (2017)Evasion Attacks against Machine Learning at Test Time., , , , , , , and . ECML/PKDD (3), volume 8190 of Lecture Notes in Computer Science, page 387-402. Springer, (2013)FPGA vs. Multi-core CPUs vs. GPUs: Hands-On Experience with a Sorting Application., , and . Facing the Multicore-Challenge, volume 6310 of Lecture Notes in Computer Science, page 105-117. Springer, (2010)Poisoning Attacks against Support Vector Machines., , and . ICML, icml.cc / Omnipress, (2012)Machine learning in adversarial environments., and . Machine Learning, 81 (2): 115-119 (2010)Foreword., , and . Journal in Computer Virology, 2 (4): 241-242 (2007)