Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. | 8 | 0.48 | 2018 |
Support vector machines under adversarial label contamination | 35 | 1.06 | 2015 |
Is Feature Selection Secure against Training Data Poisoning? | 20 | 0.66 | 2015 |
Dynamic hooks: hiding control flow changes within non-control data | 9 | 0.47 | 2014 |
SobTrA: a software-based trust anchor for ARM cortex application processors | 2 | 0.38 | 2014 |
Persistent Data-only Malware: Function Hooks without Code. | 18 | 0.66 | 2014 |
Identities for Embedded Systems Enabled by Physical Unclonable Functions. | 2 | 0.42 | 2013 |
Indicative Support Vector Clustering with Its Application on Anomaly Detection | 0 | 0.34 | 2013 |
Learning from Multiple Observers with Unknown Expertise. | 6 | 0.50 | 2013 |
Leveraging String Kernels for Malware Detection. | 5 | 0.50 | 2013 |
Improving Mobile Device Security with Operating System-Level Virtualization. | 7 | 0.55 | 2013 |
Practical information-flow aware middleware for in-car communication | 4 | 0.40 | 2013 |
OPARS: objective photo aesthetics ranking system | 0 | 0.34 | 2013 |
Lazy Gaussian Process Committee for Real-Time Online Regression. | 5 | 0.60 | 2013 |
Middleware-based Security for Hyperconnected Applications in Future In-Car Networks. | 0 | 0.34 | 2013 |
X-TIER: Kernel Module Injection. | 4 | 0.43 | 2013 |
Adversarial Label Flips Attack on Support Vector Machines. | 20 | 0.88 | 2012 |
Actively Learning Probabilistic Subsequential Transducers. | 0 | 0.34 | 2012 |
Automotive Proxy-Based Security Architecture for CE Device Integration. | 5 | 0.58 | 2012 |
Towards secure fieldbus communication | 0 | 0.34 | 2012 |
Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen. | 0 | 0.34 | 2011 |
Nitro: hardware-based system call tracing for virtual machines | 40 | 1.45 | 2011 |
T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks. | 0 | 0.34 | 2011 |
A universal semantic bridge for virtual machine introspection | 3 | 0.39 | 2011 |
Exploiting the x86 Architecture to Derive Virtual Machine State Information | 8 | 0.68 | 2010 |
Grammatical Inference Algorithms in MATLAB | 5 | 0.50 | 2010 |
Improving the quality of ring oscillator PUFs on FPGAs | 30 | 1.41 | 2010 |
A formal model for virtual machine introspection | 34 | 1.17 | 2009 |
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques | 14 | 0.98 | 2008 |
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques | 2 | 0.49 | 2008 |
Erzeugung elektronischer Signaturen mittels Trusted Platform Module | 2 | 0.46 | 2007 |