Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Weerayut Buaphet
Bhupendra Singh
F Briend
Marco Vannucci
Silvia Scirpoli
Ritsuko Onuki
Songhua Li
Sebastian Magda
David MacDonald
Meng Jiang
Home
/
Author
/
CLAUDIA ECKERT
Author Info
Open Visualization
Name
Affiliation
Papers
CLAUDIA ECKERT
Tech Univ Munich, Inst Informat, D-80290 Munich, Germany
33
Collaborators
Citations
PageRank
55
76
13.13
Referers
Referees
References
226
922
363
Search Limit
100
922
Publications (33 rows)
Collaborators (55 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Falcon: Malware Detection and Categorization with Network Traffic Images
0
0.34
2021
IntRepair : Informed Repairing of Integer Overflows
2
0.37
2021
ρFEM - Efficient Backward-edge Protection Using Reversed Forward-edge Mappings.
0
0.34
2020
MANIS: evading malware detection system on graph structure
1
0.35
2020
Analyzing control flow integrity with LLVM-CFI
0
0.34
2019
Practical Integer Overflow Prevention.
0
0.34
2017
Herausforderungen an der Schnittstelle von Informatik und Gesellschaft - Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt.
0
0.34
2017
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage.
0
0.34
2017
Combating Control Flow Linearization
0
0.34
2017
Adaptive Semantics-Aware Malware Classification.
5
0.50
2016
Skald: A Scalable Architecture For Feature Extraction, Multi-User Analysis, And Real-Time Information Sharing
4
0.45
2016
Deep Learning for Classification of Malware System Call Sequences.
12
0.59
2016
CoKey: fast token-based cooperative cryptography.
0
0.34
2016
DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract).
0
0.34
2016
Policy-Based Implicit Attestation For Microkernel-Based Virtualized Systems
0
0.34
2016
Automated Generation of Buffer Overflow Quick Fixes Using Symbolic Execution and SMT.
4
0.39
2015
Industrie 4.0? Mit Sicherheit!
0
0.34
2015
Counteracting Data-Only Malware with Code Pointer Examination.
2
0.37
2015
Learning better while sending less: Communication-efficient online semi-supervised learning in client-server settings
0
0.34
2015
Feature Selection and Extraction for Malware Classification.
4
0.40
2015
Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units.
1
0.39
2015
User Identity Verification Based On Touchscreen Interaction Analysis In Web Contexts
2
0.38
2015
Interactive Function Identification Decreasing the Effort of Reverse Engineering.
0
0.34
2015
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code
0
0.34
2015
Industrie 4.0 meets IT-Sicherheit: eine Herausforderung!
0
0.34
2015
Efficient Attack Forest Construction for Automotive On-board Networks.
0
0.34
2014
A flexible approach to distributed data anonymization.
13
0.74
2014
Blind Format String Attacks.
1
0.38
2014
Active File Integrity Monitoring Using Paravirtualized Filesystems
0
0.34
2013
Security Issues Of Multi-Core Architectures - The Automotive Case
1
0.44
2013
Lightweight Attestation And Secure Code Update For Multiple Separated Microkernel Tasks
0
0.34
2013
Efficient Online Sequence Prediction With Side Information
2
0.38
2013
Flash: Efficient, Stable and Optimal K-Anonymity
22
0.90
2012
1