Droidlegacy: Automated familial classification of android malware L Deshotels, V Notani, A Lakhotia Proceedings of ACM SIGPLAN on program protection and reverse engineering …, 2014 | 189 | 2014 |
Identifying shared software components to support malware forensics B Ruttenberg, C Miles, L Kellogg, V Notani, M Howard, C LeDoux, ... Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014 | 48 | 2014 |
VirusBattle: State-of-the-art malware analysis for better cyber threat intelligence C Miles, A Lakhotia, C LeDoux, A Newsom, V Notani 2014 7th International Symposium on Resilient Control Systems (ISRCS), 1-6, 2014 | 39 | 2014 |
FuncTracker: Discovering Shared Code to Aid Malware Forensics C LeDoux, A Lakhotia, C Miles, V Notani, A Pfeffer 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’13), 2013 | 18 | 2013 |
Malware economics and its implication to anti-malware situational awareness A Lakhotia, V Notani, C LeDoux 2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018 | 4 | 2018 |
Behavioral Analysis of Malware V Notani BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE-Pilani, 2013 | 3* | 2013 |
Learning based widening V Notani, R Giacobazzi 8th Workshop on Tools for Automatic Program Analysis (TAPAS 2017), New York, USA, 2017 | 2 | 2017 |
Approximations in Learning & Program Analysis V Notani University of Verona, 2020 | | 2020 |