Follow
Khanh Huu The Dam
Khanh Huu The Dam
Unknown affiliation
Verified email at uclouvain.be
Title
Cited by
Cited by
Year
Malware Detection based on Graph Classification.
Khanh-Huu-The Dam, T Touili
ICISSP, 455-463, 2017
142017
Packer classification based on association rule mining
KHT Dam, T Given-Wilson, A Legay, R Veroneze
Applied Soft Computing 127, 109373, 2022
112022
Learning android malware
KHT Dam, T Touili
Proceedings of the 12th International Conference on Availability …, 2017
112017
Learning malware using generalized graph kernels
KHT Dam, T Touili
Proceedings of the 13th international conference on availability …, 2018
72018
Tool Paper-SEMA: Symbolic Execution Toolchain for Malware Analysis
CH Bertrand Van Ouytsel, C Crochet, KHT Dam, A Legay
International Conference on Risks and Security of Internet and Systems, 62-68, 2022
62022
Unsupervised behavioural mining and clustering for malware family identification
KHT Dam, T Given-Wilson, A Legay
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 374-383, 2021
62021
Precise extraction of malicious behaviors
KHT Dam, T Touili
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
52018
Analysis of machine learning approaches to packing detection
CHB Van Ouytsel, KHT Dam, A Legay
Computers & Security, 103536, 2023
42023
Symbolic analysis meets federated learning to enhance malware identifier
CH Bertrand Van Ouytsel, KHT Dam, A Legay
Proceedings of the 17th International Conference on Availability …, 2022
42022
STAMAD: a static malware detector
KHT Dam, T Touili
Proceedings of the 14th International Conference on Availability …, 2019
42019
Symbolic analysis meets federated learning to enhance malware identifier
KHT Dam, CHB Van Ouytsel, A Legay
arXiv preprint arXiv:2204.14159, 2022
22022
Automated repair of security errors in C programs via statistical model checking: a proof of concept
KHT Dam, F Duchene, T Given-Wilson, M Cordy, A Legay
International Symposium on Leveraging Applications of Formal Methods, 279-298, 2022
12022
Extracting malicious behaviours
KHT Dam, T Touili
International Journal of Information and Computer Security 17 (3-4), 365-404, 2022
12022
Mitigate Data Poisoning Attack by Partially Federated Learning
KHT Dam, A Legay
Proceedings of the 18th International Conference on Availability …, 2023
2023
STAMAD: a STAtic MAlware Detector.
T Touili
Proceedings of the 14th International Conference on Availability …, 2019
2019
Learning Android Malware.
Khanh-Huu-The Dam, T Touili
ARES, 59:1-59:9, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–16