Dennis Gamayunov

Orcid: 0000-0002-2949-9269

According to our database1, Dennis Gamayunov authored at least 12 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Dead or alive: Discovering server HTTP endpoints in both reachable and dead client-side code.
J. Inf. Secur. Appl., 2024

2023
Finding Server-Side Endpoints with Static Analysis of Client-Side JavaScript.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2017
Automated Static Analysis and Classification of Android Malware using Permission and API Calls Models.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

2016
Autonomous Vulnerability Scanning and Patching of Binaries.
Proceedings of the Google It, Total Information Awareness, 2016

2015
Securing mobile devices: malware mitigation methods.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Towards automated web application logic reconstruction for application level security.
CoRR, 2015

Review of the Mobile Malware Detection Approaches.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

2014
Adaptive Visualization Interface That Manages User's Cognitive Load Based on Interaction Characteristics.
Proceedings of the 7th International Symposium on Visual Information Communication and Interaction, 2014

Falsifiability of network security research: the good, the bad, and the ugly.
Proceedings of the 1st ACM SIGPLAN Workshop on Reproducible Research Methodologies and New Publication Models in Computer Engineering, 2014

2013
Adaptive Security Event Visualization for Continuous Monitoring.
Proceedings of the Late-Breaking Results, 2013

2011
Towards Malware-Resistant Networking Environment.
Proceedings of the First SysSec Workshop 2011, 2011

2009
Visualization of complex attacks and state of attacked network.
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009


  Loading...