Author of the publication

VoterChoice: A ransomware detection honeypot with multiple voting framework.

, , , , and . Concurr. Comput. Pract. Exp., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Testing Digital Forensic Software Tools Used in Expert Testimony., and . Handbook of Research on Computational Forensics, Digital Crime, and Investigation, IGI Global, (2010)Distributed Parallel Computing using Navigational Programming: Orchestrating Computations Around Data., , , , and . IASTED PDCS, page 453-458. IASTED/ACTA Press, (2002)Data-Driven Cyber Security in Perspective - Intelligent Traffic Analysis., , , , and . IEEE Trans. Cybern., 50 (7): 3081-3093 (2020)Private and Trustworthy Distributed Lending Model Using Hyperledger Besu., , and . SN Comput. Sci., 2 (2): 115 (2021)Modulation Method for Nine-Switch Converter Based on Equivalent Mechanism Between Nine-Switch Converter and Dual Six-Switch Converters., , , , and . IEEE Trans. Ind. Electron., 68 (4): 2845-2855 (2021)Unsupervised Robust Projection Learning by Low-Rank and Sparse Decomposition for Hyperspectral Feature Extraction., , , , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)Application of Ground-Penetrating Radar with the Logging Data Constraint in the Detection of Fractured Rock Mass in Dazu Rock Carvings, Chongqing, China., , , , , , and . Remote. Sens., 15 (18): 4452 (September 2023)Global event influence model: integrating crowd motion and social psychology for global anomaly detection in dense crowds., , , and . J. Electronic Imaging, 28 (2): 023033 (2019)A Unified Variational Model for Single Image Dehazing., , , , and . IEEE Access, (2019)Mobile Agents - The Right Vehicle for Distributed Sequential Computing., , , and . HiPC, volume 2552 of Lecture Notes in Computer Science, page 575-586. Springer, (2002)