Your selections:
Evolved similarity techniques in malware analysis
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Techniques for the reverse engineering of banking malware
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Reanimating historic malware samples
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Identifying cross-version function similarity using contextual features
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Cross-compiler bipartite vulnerability search
Anti-analysis trends in banking malware
Function similarity using family context
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Be careful who you trust: Issues with the public key infrastructure
AFES: An advanced forensic evidence system
- Black, Paul, Gondal, Iqbal, Brooks, Richard, Yu, Lu
Malware variant identification using incremental clustering
- Black, Paul, Gondal, Iqbal, Bagirov, Adil, Moniruzzaman, Md
Spam email categorization with nlp and using federated deep learning
- Ul Haq, Ikram, Black, Paul, Gondal, Iqbal, Kamruzzaman, Joarder, Watters, Paul, Kayes, A.
Are you sure you would like to clear your session, including search history and login status?