Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Koh Aoki
Nobuyoshi Honda
Yanqiao Wei
Bhupendra Singh
Jhong-Ting Luo
Silvia Scirpoli
David J. Westover
Songhua Li
Sebastian Magda
David MacDonald
Home
/
Author
/
THOMAS H. AUSTIN
Author Info
Open Visualization
Name
Affiliation
Papers
THOMAS H. AUSTIN
University of California, Santa Cruz, Santa Cruz, CA, USA
27
Collaborators
Citations
PageRank
44
307
15.96
Referers
Referees
References
578
550
510
Search Limit
100
578
Publications (27 rows)
Collaborators (44 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Malware Detection Using Dynamic Birthmarks.
4
0.44
2019
Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid Applications.
0
0.34
2018
Multiple Facets for Dynamic Information Flow with Exceptions.
2
0.36
2017
SocioBot: a Twitter-based botnet
0
0.34
2017
Using Precise Taint Tracking for Auto-sanitization.
2
0.38
2017
Clustering for malware classification.
4
0.42
2017
A comparison of static, dynamic, and hybrid analysis for malware detection
27
1.09
2017
Precise, Dynamic Information Flow for Database-Backed Applications
7
0.44
2016
Faceted Dynamic Information Flow via Control and Data Monads.
9
0.48
2016
Web-based Volunteer Computing for Solving the Elliptic Curve Discrete Logarithm Problem.
0
0.34
2016
Support vector machines and malware detection.
6
0.49
2016
Clustering versus SVM for malware detection
2
0.38
2016
Advanced transcriptase for JavaScript malware
0
0.34
2016
Hidden Markov models for malware classification.
24
0.82
2015
Volunteer Computing for Solving an Elliptic Curve Discrete Logarithm Problem.
0
0.34
2015
Compression-based analysis of metamorphic malware
4
0.41
2015
End-To-End Policy-Agnostic Security for Database-Backed Applications
2
0.39
2015
Singular value decomposition and metamorphic detection.
7
0.49
2015
Dueling hidden Markov models for virus analysis.
4
0.42
2015
Hunting for metamorphic JavaScript malware.
8
0.51
2015
Metamorphic code generation from LLVM bytecode.
4
0.53
2014
Faceted execution of policy-agnostic programs
9
0.46
2013
Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach
31
1.18
2013
Multiple facets for dynamic information flow
83
2.13
2012
A Functional View of Imperative Information Flow.
5
0.42
2012
Virtual values for language extension
15
0.80
2011
Permissive dynamic information flow analysis
48
1.25
2010
1