Cited By
View all- McCully GHastings JXu SFortier A(2024)Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code2024 Cyber Awareness and Research Symposium (CARS)10.1109/CARS61786.2024.10778724(1-8)Online publication date: 28-Oct-2024
- Ren PLiu WLiu KSun D(2011)Study on Event-Sequence Based Worm Behavior Analysis in InternetProceedings of the 2011 First International Workshop on Complexity and Data Mining10.1109/IWCDM.2011.36(125-128)Online publication date: 24-Sep-2011
- Shun-Wen Hsiao Sun YChen MHui Zhang (2010)Behavior profiling for robust anomaly detection2010 IEEE International Conference on Wireless Communications, Networking and Information Security10.1109/WCINS.2010.5541822(465-471)Online publication date: Jun-2010
- Show More Cited By