Fairbanks, J., Orbe, A., Patterson, C., Serra, E., and Scheepers, M. Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability (Student Abstract). Retrieved from https://par.nsf.gov/biblio/10311331. Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence - Student Abstract and Poster Program .
Fairbanks, J., Orbe, A., Patterson, C., Serra, E., & Scheepers, M. Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability (Student Abstract). Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence - Student Abstract and Poster Program, (). Retrieved from https://par.nsf.gov/biblio/10311331.
Fairbanks, J., Orbe, A., Patterson, C., Serra, E., and Scheepers, M.
"Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability (Student Abstract)". Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence - Student Abstract and Poster Program (). Country unknown/Code not available. https://par.nsf.gov/biblio/10311331.
@article{osti_10311331,
place = {Country unknown/Code not available},
title = {Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability (Student Abstract)},
url = {https://par.nsf.gov/biblio/10311331},
abstractNote = {},
journal = {Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence - Student Abstract and Poster Program},
author = {Fairbanks, J. and Orbe, A. and Patterson, C. and Serra, E. and Scheepers, M.},
}
Warning: Leaving National Science Foundation Website
You are now leaving the National Science Foundation website to go to a non-government website.
Website:
NSF takes no responsibility for and exercises no control over the views expressed or the accuracy of
the information contained on this site. Also be aware that NSF's privacy policy does not apply to this site.