Cited By
View all- Wong MLanden MLi FMonrose FAhamad MKelley PKapadia A(2024)Comparing malware evasion theory with practiceProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696903(61-80)Online publication date: 12-Aug-2024
- Botacin M(2024)What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developmentsProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678892(77-96)Online publication date: 30-Sep-2024
- Zeraatkar AKamran PKaur IRamu NSheaves TAl-Asaad H(2024)On the Performance of Malware Detection Classifiers Using Hardware Performance Counters2024 International Conference on Smart Applications, Communications and Networking (SmartNets)10.1109/SmartNets61466.2024.10577644(1-6)Online publication date: 28-May-2024
- Show More Cited By