Skip to content
Overview
Team
Projects
Capabilities
Blog
Presentations
Publications
In the news
Demos
Sophos.com
De-anonymizing programmers via code stylometry
Richard Harang
Attribution
Post navigation
Previous:
Crafting adversarial input sequences for recurrent neural networks
Next:
Malware Data Science: Attack Detection and Attribution