Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image-based malware classification hybrid framework based on space-filling curves., and . Comput. Secur., (2022)Malware family classification via efficient Huffman features., and . Digit. Investig., (2021)Development and Evaluation of a Dataset Generator Tool for Generating Synthetic Log Files Containing Computer Attack Signatures., and . Int. J. Ambient Comput. Intell., 3 (2): 64-76 (2011)Digital forensic tools: Recent advances and enhancing the status quo., , and . Digit. Investig., (2020)Robustness of Image-Based Malware Classification Models trained with Generative Adversarial Networks., , and . EICC, page 92-99. ACM, (2023)Automating the Generation of User Activity Timelines on Microsoft Vista and Windows 7 Operating Systems., and . Int. J. Ambient Comput. Intell., 4 (2): 35-47 (2012)Image-based Malware Classification: A Space Filling Curve Approach.. VizSEC, page 1-10. IEEE, (2019)Tracking User Activity on Personal Computers., and . ICDF2C, volume 88 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 188-196. Springer, (2011)Improving file-level fuzzy hashes for malware variant classification., and . Digit. Investig., (2019)Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations., , , and . Digit. Investig., (2021)