Packer classification based on association rule mining KHT Dam, T Given-Wilson, A Legay, R Veroneze Applied Soft Computing 127, 109373, 2022 | 20 | 2022 |
Analysis of machine learning approaches to packing detection CHB Van Ouytsel, KHT Dam, A Legay Computers & Security, 103536, 2023 | 14 | 2023 |
Malware Detection based on Graph Classification. Khanh-Huu-The Dam, T Touili ICISSP, 455-463, 2017 | 14 | 2017 |
Learning android malware KHT Dam, T Touili Proceedings of the 12th International Conference on Availability …, 2017 | 12 | 2017 |
Unsupervised behavioural mining and clustering for malware family identification KHT Dam, T Given-Wilson, A Legay Proceedings of the 36th Annual ACM Symposium on Applied Computing, 374-383, 2021 | 10 | 2021 |
Tool Paper-SEMA: Symbolic Execution Toolchain for Malware Analysis CH Bertrand Van Ouytsel, C Crochet, KHT Dam, A Legay International Conference on Risks and Security of Internet and Systems, 62-68, 2022 | 9 | 2022 |
Learning malware using generalized graph kernels KHT Dam, T Touili Proceedings of the 13th international conference on availability …, 2018 | 6 | 2018 |
Precise extraction of malicious behaviors KHT Dam, T Touili 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 6 | 2018 |
STAMAD: a STAtic MAlware Detector. T Touili Proceedings of the 14th International Conference on Availability …, 2019 | 5* | 2019 |
STAMAD: a static malware detector KHT Dam, T Touili Proceedings of the 14th International Conference on Availability …, 2019 | 5 | 2019 |
Symbolic analysis meets federated learning to enhance malware identifier CH Bertrand Van Ouytsel, KHT Dam, A Legay Proceedings of the 17th International Conference on Availability …, 2022 | 3 | 2022 |
Symbolic analysis meets federated learning to enhance malware identifier KHT Dam, CHB Van Ouytsel, A Legay arXiv preprint arXiv:2204.14159, 2022 | 2 | 2022 |
Extracting malicious behaviours KHT Dam, T Touili International Journal of Information and Computer Security 17 (3-4), 365-404, 2022 | 2 | 2022 |
Automated repair of security errors in C programs via statistical model checking: a proof of concept KHT Dam, F Duchene, T Given-Wilson, M Cordy, A Legay International Symposium on Leveraging Applications of Formal Methods, 279-298, 2022 | 1 | 2022 |
Feature selection for packer classification based on association rule mining R Veroneze, CHB Van Ouytsel, KHT Dam, A Legay Engineering Applications of Artificial Intelligence 137, 109083, 2024 | | 2024 |
Avoiding" Hot Potato" Problems in Internet Service Providers KHT Dam, GK Ndonda, A Legay, R Sadre NOMS 2024-2024 IEEE Network Operations and Management Symposium, 1-6, 2024 | | 2024 |
Mitigate Data Poisoning Attack by Partially Federated Learning KHT Dam, A Legay Proceedings of the 18th International Conference on Availability …, 2023 | | 2023 |
Learning Android Malware. Khanh-Huu-The Dam, T Touili ARES, 59:1-59:9, 2017 | | 2017 |