Follow
Khanh Huu The Dam
Khanh Huu The Dam
Unknown affiliation
Verified email at uclouvain.be
Title
Cited by
Cited by
Year
Packer classification based on association rule mining
KHT Dam, T Given-Wilson, A Legay, R Veroneze
Applied Soft Computing 127, 109373, 2022
202022
Analysis of machine learning approaches to packing detection
CHB Van Ouytsel, KHT Dam, A Legay
Computers & Security, 103536, 2023
142023
Malware Detection based on Graph Classification.
Khanh-Huu-The Dam, T Touili
ICISSP, 455-463, 2017
142017
Learning android malware
KHT Dam, T Touili
Proceedings of the 12th International Conference on Availability …, 2017
122017
Unsupervised behavioural mining and clustering for malware family identification
KHT Dam, T Given-Wilson, A Legay
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 374-383, 2021
102021
Tool Paper-SEMA: Symbolic Execution Toolchain for Malware Analysis
CH Bertrand Van Ouytsel, C Crochet, KHT Dam, A Legay
International Conference on Risks and Security of Internet and Systems, 62-68, 2022
92022
Learning malware using generalized graph kernels
KHT Dam, T Touili
Proceedings of the 13th international conference on availability …, 2018
62018
Precise extraction of malicious behaviors
KHT Dam, T Touili
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
62018
STAMAD: a STAtic MAlware Detector.
T Touili
Proceedings of the 14th International Conference on Availability …, 2019
5*2019
STAMAD: a static malware detector
KHT Dam, T Touili
Proceedings of the 14th International Conference on Availability …, 2019
52019
Symbolic analysis meets federated learning to enhance malware identifier
CH Bertrand Van Ouytsel, KHT Dam, A Legay
Proceedings of the 17th International Conference on Availability …, 2022
32022
Symbolic analysis meets federated learning to enhance malware identifier
KHT Dam, CHB Van Ouytsel, A Legay
arXiv preprint arXiv:2204.14159, 2022
22022
Extracting malicious behaviours
KHT Dam, T Touili
International Journal of Information and Computer Security 17 (3-4), 365-404, 2022
22022
Automated repair of security errors in C programs via statistical model checking: a proof of concept
KHT Dam, F Duchene, T Given-Wilson, M Cordy, A Legay
International Symposium on Leveraging Applications of Formal Methods, 279-298, 2022
12022
Feature selection for packer classification based on association rule mining
R Veroneze, CHB Van Ouytsel, KHT Dam, A Legay
Engineering Applications of Artificial Intelligence 137, 109083, 2024
2024
Avoiding" Hot Potato" Problems in Internet Service Providers
KHT Dam, GK Ndonda, A Legay, R Sadre
NOMS 2024-2024 IEEE Network Operations and Management Symposium, 1-6, 2024
2024
Mitigate Data Poisoning Attack by Partially Federated Learning
KHT Dam, A Legay
Proceedings of the 18th International Conference on Availability …, 2023
2023
Learning Android Malware.
Khanh-Huu-The Dam, T Touili
ARES, 59:1-59:9, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–18