Cited By
View all- Yong Wong MLanden MAntonakakis MBlough DRedmiles EAhamad MKim YKim JVigna GShi E(2021)An Inside Look into the Practice of Malware AnalysisProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484759(3053-3069)Online publication date: 12-Nov-2021
- Viglianisi GCarminati MPolino MContinella AZanero SMcDonald JBardin SStakhanova N(2018)SysTaintProceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop10.1145/3289239.3289245(1-12)Online publication date: 3-Dec-2018
- Abraham BMandya ABapat RAlali FBrown DVeeraraghavan M(2018)A Comparison of Machine Learning Approaches to Detect Botnet Traffic2018 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN.2018.8489096(1-8)Online publication date: Jul-2018
- Show More Cited By