Follow
Vivek Notani
Title
Cited by
Cited by
Year
Droidlegacy: Automated familial classification of android malware
L Deshotels, V Notani, A Lakhotia
Proceedings of ACM SIGPLAN on program protection and reverse engineering …, 2014
1812014
Identifying shared software components to support malware forensics
B Ruttenberg, C Miles, L Kellogg, V Notani, M Howard, C LeDoux, ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014
492014
VirusBattle: State-of-the-art malware analysis for better cyber threat intelligence
C Miles, A Lakhotia, C LeDoux, A Newsom, V Notani
2014 7th International Symposium on Resilient Control Systems (ISRCS), 1-6, 2014
362014
FuncTracker: Discovering Shared Code to Aid Malware Forensics
C LeDoux, A Lakhotia, C Miles, V Notani, A Pfeffer
6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’13), 2013
152013
Behavioral Analysis of Malware
V Notani
BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE-Pilani, 2013
3*2013
Malware economics and its implication to anti-malware situational awareness
A Lakhotia, V Notani, C LeDoux
2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018
22018
Learning based widening
V Notani, R Giacobazzi
8th Workshop on Tools for Automatic Program Analysis (TAPAS 2017), New York, USA, 2017
22017
Approximations in Learning & Program Analysis
V Notani
University of Verona, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–8