Anna Mpanti

According to our database1, Anna Mpanti authored at least 15 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adding a Tail in Classes of Perfect Graphs.
Algorithms, June, 2023

Strong watermark numbers encoded as reducible permutation graphs against edge modification attacks.
J. Comput. Secur., 2023

Adding an Edge in a P<sub>4</sub>-sparse Graph.
CoRR, 2023

2022
Edge modification on perfect and reducible graphs with application to watermarking
PhD thesis, 2022

An Experimental Study of Algorithms for Packing Arborescences.
Proceedings of the 20th International Symposium on Experimental Algorithms, 2022

2021
A graph-based framework for malicious software detection and classification utilizing temporal-graphs.
J. Comput. Secur., 2021

Detection and Classification of Malicious Software based on Regional Matching of Temporal Graphs.
Proceedings of the CompSysTech '21: International Conference on Computer Systems and Technologies '21, 2021

2019
Malicious Software Detection utilizing Temporal-Graphs.
Proceedings of the 20th International Conference on Computer Systems and Technologies, 2019

2018
Characterizing Watermark Numbers encoded as Reducible Permutation Graphs against Malicious Attacks.
CoRR, 2018

Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations.
CoRR, 2018

A Graph-based Model for Malicious Software Detection Exploiting Domination Relations between System-call Groups.
Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018

2017
Experimental Study of the Resilience of a Graph-based Watermarking System under Edge Modifications.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017

Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017

2016
Two RPG Flow-graphs for Software Watermarking using Bitonic Sequences of Self-inverting Permutations.
CoRR, 2016

Graph-structured Watermarking using Bitonic Sequences of Self-inverting Permutations.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016


  Loading...