Your selections:
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Evolved similarity techniques in malware analysis
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Function similarity using family context
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Identifying cross-version function similarity using contextual features
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Reanimating historic malware samples
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Are you sure you would like to clear your session, including search history and login status?