关注
Thomas H. Austin
Thomas H. Austin
Associate Professor of Computer Science, San Jose State University
在 bias2build.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A comparison of static, dynamic, and hybrid analysis for malware detection
A Damodaran, FD Troia, CA Visaggio, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 13, 1-12, 2017
5002017
Efficient purely-dynamic information flow analysis
TH Austin, C Flanagan
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and …, 2009
3092009
Multiple facets for dynamic information flow
TH Austin, C Flanagan
Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2012
2612012
Permissive dynamic information flow analysis
TH Austin, C Flanagan
Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010
2052010
Hidden Markov models for malware classification
C Annachhatre, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 11, 59-73, 2015
1672015
Exploring hidden Markov models for virus analysis: A semantic approach
TH Austin, E Filiol, S Josse, M Stamp
2013 46th Hawaii International Conference on System Sciences, 5039-5048, 2013
1062013
Precise, dynamic information flow for database-backed applications
J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong
ACM Sigplan Notices 51 (6), 631-647, 2016
872016
Support vector machines and malware detection
T Singh, F Di Troia, VA Corrado, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 12, 203-212, 2016
822016
Clustering for malware classification
S Pai, FD Troia, CA Visaggio, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 13, 95-107, 2017
812017
Faceted execution of policy-agnostic programs
TH Austin, J Yang, C Flanagan, A Solar-Lezama
Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and …, 2013
732013
Septic discitis.
GA McCain, M Harth, DA Bell, TF Disney, T Austin, E Ralph
The Journal of Rheumatology 8 (1), 100-109, 1981
561981
Malware detection using dynamic birthmarks
S Vemparala, F Di Troia, VA Corrado, TH Austin, M Stamo
Proceedings of the 2016 ACM on international workshop on security and …, 2016
542016
Systems and methods of blockchain platform for distributed applications
TH Austin, S Basu
US Patent 11,165,862, 2021
462021
Clustering versus SVM for malware detection
U Narra, FD Troia, VA Corrado, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 12, 213-224, 2016
442016
Virtual values for language extension
TH Austin, T Disney, C Flanagan
Proceedings of the 2011 ACM international conference on Object oriented …, 2011
402011
Dueling hidden Markov models for virus analysis
A Kalbhor, TH Austin, E Filiol, S Josse, M Stamp
Journal of Computer Virology and Hacking Techniques 11, 103-118, 2015
332015
Singular value decomposition and metamorphic detection
RK Jidigam, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 11, 203-216, 2015
322015
Hunting for metamorphic JavaScript malware
M Musale, TH Austin, M Stamp
Journal of Computer Virology and Hacking Techniques 11, 89-102, 2015
312015
Multiple facets for dynamic information flow with exceptions
TH Austin, T Schmitz, C Flanagan
ACM Transactions on Programming Languages and Systems (TOPLAS) 39 (3), 1-56, 2017
282017
Faceted dynamic information flow via control and data monads
T Schmitz, D Rhodes, TH Austin, K Knowles, C Flanagan
International Conference on Principles of Security and Trust, 3-23, 2016
262016
系统目前无法执行此操作,请稍后再试。
文章 1–20