Automated Behavior Analysis of Malware: A Case Study of WannaCry Ransomware Conference Paper January, 2018
Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors Conference Paper January, 2018