Adrian Colesa

Orcid: 0000-0002-2431-4253

According to our database1, Adrian Colesa authored at least 35 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
LEDA - Layered Event-Based Malware Detection Architecture.
Sensors, October, 2024

SpecRep: Adversary Emulation Based on Attack Objective Specification in Heterogeneous Infrastructures.
Sensors, September, 2024

Detection Strategies for COM, WMI, and ALPC-Based Multi-Process Malware.
Sensors, August, 2024

PwnMaster: Automatic Buffer Overflow and Format String Vulnerability Detection and Exploitation.
Proceedings of the IEEE International Conference on Automation, 2024

2023
Ember Feature Dataset Analysis For Malware Detection.
Proceedings of the 19th IEEE International Conference on Intelligent Computer Communication and Processing, 2023

Efficient Multi-Stage Detection of Malicious Windows Executable During Execution.
Proceedings of the 19th IEEE International Conference on Intelligent Computer Communication and Processing, 2023

2021
Infrastructure for Capturing and Persisting Virtualization-Specific Events Triggered by In-Guest Process Executions for Behavioral-Based Analysis.
Proceedings of the 2021 20th RoEduNet Conference: Networking in Education and Research (RoEduNet), 2021

Curator - A system for creating data sets for behavioral malware detection.
Proceedings of the 20th International Symposium on Parallel and Distributed Computing, 2021

VE-VMI: High-Performance Virtual Machine Introspection Based on Virtualization Exception.
Proceedings of the 20th International Symposium on Parallel and Distributed Computing, 2021

2020
Following the Pebble Trail: Extending Return-Oriented Programming to RISC-V.
Proceedings of the CCSW'20, 2020

2019
Router-based IoT Security using Raspberry Pi.
Proceedings of the 2019 18th RoEduNet Conference: Networking in Education and Research (RoEduNet), 2019

A Flexible Windows Workspace Saving and Restoring Utility.
Proceedings of the 15th IEEE International Conference on Intelligent Computer Communication and Processing, 2019

Securely Exposing Machine Learning Models to Web Clients using Intel SGX.
Proceedings of the 15th IEEE International Conference on Intelligent Computer Communication and Processing, 2019

2018
File System Minifilter Based Data Leakage Prevention System.
Proceedings of the 2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet), 2018

Malware Clustering Based on Called API During Runtime.
Proceedings of the Information and Operational Technology Security Systems, 2018

False Positive Mitigation in Behavioral Malware Detection Using Deep Learning.
Proceedings of the 14th IEEE International Conference on Intelligent Computer Communication and Processing, 2018

Fast switch into a trustworthy virtual machine for running security-sensitive applications.
Proceedings of the IEEE International Conference on Automation, 2018

2016
U-HIPE: hypervisor-based protection of user-mode processes in Windows.
J. Comput. Virol. Hacking Tech., 2016

Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016

BITMIX: A hardware accelerated randomized symmetric encryption method.
Proceedings of the IEEE International Conference on Automation, 2016

2015
Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

2014
Automatic code features extraction using bio-inspired algorithms.
J. Comput. Virol. Hacking Tech., 2014

Fast creation of short-living virtual machines using copy-on-write RAM-disks.
Proceedings of the IEEE International Conference on Automation, 2014

2013
From Plagiarism to Malware Detection.
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013

2012
A Metric for Evaluating the Usability of File Systems.
Proceedings of the 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2012

Improving the Responsiveness of Replicated Virtualized Services in Case of Overloaded Replicas Connectivity.
Proceedings of the 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2012

2011
Flexible Organization in the OrcFS Relational File System for Efficient File Searching.
Scalable Comput. Pract. Exp., 2011

An Adaptive Virtual Machine Replication Algorithm for Highly-Available Services.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011

2010
Transparent Fault-Tolerance Based on Asynchronous Virtual Machine Replication.
Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2010

OrcFS: Organized Relationships between Components of the File System for Efficient File Retrieval.
Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2010

2008
Software Random Number Generation Based on Race Conditions.
Proceedings of the SYNASC 2008, 2008

2007
GLinda - Grid-Based Distributed Linda System.
Proceedings of the Ninth International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2007

Automatic and Reliable Distribution of Data in Grids over Globus Toolkit.
Proceedings of the Ninth International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2007

2006
Providing High Data Availability in MedioGRID.
Proceedings of the 8th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC 2006), 2006


  Loading...