Khanh-Huu-The Dam

According to our database1, Khanh-Huu-The Dam authored at least 16 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Analysis of machine learning approaches to packing detection.
Comput. Secur., January, 2024

2023
Mitigate Data Poisoning Attack by Partially Federated Learning.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Extracting malicious behaviours.
Int. J. Inf. Comput. Secur., 2022

Packer classification based on association rule mining.
Appl. Soft Comput., 2022

Automated Repair of Security Errors in C Programs via Statistical Model Checking: A Proof of Concept.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles, 2022

Tool Paper - SEMA: Symbolic Execution Toolchain for Malware Analysis.
Proceedings of the Risks and Security of Internet and Systems, 2022

Symbolic analysis meets federated learning to enhance malware identifier.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Unsupervised behavioural mining and clustering for malware family identification.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

MADLIRA: A Tool for Android Malware Detection.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2019
STAMAD: a STAtic MAlware Detector.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Precise Extraction of Malicious Behaviors.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Learning Malware Using Generalized Graph Kernels.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Extracting Android Malicious Behaviors.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Malware Detection based on Graph Classification.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Learning Android Malware.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Automatic extraction of malicious behaviors.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016


  Loading...