Michael Venable

According to our database1, Michael Venable authored at least 2 papers in 2005.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2005
A Method for Detecting Obfuscated Calls in Malicious Binaries.
IEEE Trans. Software Eng., 2005

Analyzing Memory Accesses in Obfuscated x86 Executables.
Proceedings of the Detection of Intrusions and Malware, 2005


  Loading...