Cited By
View all- Botacin M(2024)What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developmentsProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678892(77-96)Online publication date: 30-Sep-2024
- Xu FZhang WQiang WJin H(2023)Multi-path exploration guided by taint and probability against evasive malwareSecurity and Safety10.1051/sands/20230232(2023023)Online publication date: 5-Sep-2023
- Canavese DRegano LLioy A(2023)Computer-Aided Reverse Engineering of Protected SoftwareDigital Sovereignty in Cyber Security: New Challenges in Future Vision10.1007/978-3-031-36096-1_1(3-15)Online publication date: 16-Jun-2023