Cited By
View all- Natsos DSymeonidis A(2025)Transformer-based malware detection using process resource utilization metricsResults in Engineering10.1016/j.rineng.2025.104250(104250)Online publication date: Feb-2025
- Zheng LZhang JWang XLin FMeng Z(2024)Multimodal-based abnormal behavior detection method in virtualization environmentComputers & Security10.1016/j.cose.2024.103908143(103908)Online publication date: Aug-2024
- Chen ZQiu HDing X(2024)DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM DevicesComputer Security – ESORICS 202310.1007/978-3-031-51482-1_14(271-289)Online publication date: 11-Jan-2024
- Show More Cited By