Anthony Arrott

According to our database1, Anthony Arrott authored at least 9 papers between 2012 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Cluster analysis for deobfuscation of malware variants during ransomware attacks.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

2017
Measuring cloud-based anti-malware protection for office 365 user accounts.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

For cloud services on a user's multiple devices, how do we measure the trusted zone defended by anti-malware?
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2015
Segmented sandboxing - A novel approach to Malware polymorphism detection.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

2014
Protection against remote code execution exploits of popular applications in Windows.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

2013
Use-case-specific metrics for comparative testing of endpoint security products.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

Measuring the effectiveness of modern security products to detect and contain emerging threats - A consensus-based approach.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

2012
Component protection metrics for security product development: I. AV-TEST Full Product Tests.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012


  Loading...