BibTeX records: Abhilash Hota

download as .bib file

@inproceedings{DBLP:conf/csr2/HotaS22,
  author       = {Abhilash Hota and
                  J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder},
  title        = {A Bayesian Model Combination based approach to Active Malware Analysis},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2022, Rhodes, Greece, July 27-29, 2022},
  pages        = {331--336},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSR54599.2022.9850338},
  doi          = {10.1109/CSR54599.2022.9850338},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csr2/HotaS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-04781,
  author       = {Abhilash Hota and
                  J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder},
  title        = {A Bayesian Model Combination-based approach to Active Malware Analysis},
  journal      = {CoRR},
  volume       = {abs/2212.04781},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.04781},
  doi          = {10.48550/ARXIV.2212.04781},
  eprinttype    = {arXiv},
  eprint       = {2212.04781},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-04781.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FiliolH19,
  author       = {Eric Filiol and
                  Abhilash Hota},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Solving a Hard Instance of Suspicious Behaviour Detection with Sparse
                  Binary Vectors Clustering},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {635--644},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007347206350644},
  doi          = {10.5220/0007347206350644},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FiliolH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HotaI19,
  author       = {Abhilash Hota and
                  Paul Irolla},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Deep Neural Networks for Android Malware Detection},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {657--663},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007617606570663},
  doi          = {10.5220/0007617606570663},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HotaI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics