Follow
George D. Webster
George D. Webster
Verified email at sec.in.tum.de - Homepage
Title
Cited by
Cited by
Year
Deep learning for classification of malware system call sequences
B Kolosnjaji, A Zarras, G Webster, C Eckert
AI 2016: Advances in Artificial Intelligence: 29th Australasian Joint …, 2016
6872016
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system
TK Lengyel, S Maresca, BD Payne, GD Webster, S Vogl, A Kiayias
Proceedings of the 30th annual computer security applications conference …, 2014
2792014
Empowering convolutional networks for malware classification and analysis
B Kolosnjaji, G Eraisha, G Webster, A Zarras, C Eckert
2017 International Joint Conference on Neural Networks (IJCNN), 3838-3845, 2017
1312017
Adaptive semantics-aware malware classification
B Kolosnjaji, A Zarras, T Lengyel, G Webster, C Eckert
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
412016
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
GD Webster, B Kolosnjaji, C von Pentz, J Kirsch, ZD Hanif, A Zarras, ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
392017
SKALD: a scalable architecture for feature extraction, multi-user analysis, and real-time information sharing
GD Webster, ZD Hanif, ALP Ludwig, TK Lengyel, A Zarras, C Eckert
Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016
172016
Sharing is caring: Collaborative analysis and real-time enquiry for security analytics
GD Webster, RL Harris, ZD Hanif, BA Hembree, J Grossklags, C Eckert
2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018
112018
Pitfalls of virtual machine introspection on modern hardware
T Lengyel, T Kittel, G Webster, J Torrey, C Eckert
1st Workshop on Malware Memory Forensics (MMF), 2014
82014
Internet-Scale File Analysis
Z Hanif, TK Lengyel, GD Webster
Black Hat USA, 2015
22015
Network inventory management and anomaly detection system
H Xiao, G Webster, B Kolosnjaji, A Carney
US Patent App. 17/945,711, 2024
2024
From Bayesian Networks to Belief Propagation (based on book Probabilistic Graphical Models [1])
BKHXG Webster
2015
Kickoff: Anomaly Detection Challenges
H Xiao, B Kolosnjaji, G Webster, B Weggenmann
2015
The system can't perform the operation now. Try again later.
Articles 1–12