Author of the publication

A Study on Similarity Calculation Method for API Invocation Sequences.

, , and . RSKT, volume 9436 of Lecture Notes in Computer Science, page 492-501. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS., , , , , and . Comput. Syst. Sci. Eng., 45 (2): 1145-1165 (2023)Malware classification using byte sequence information., , and . RACS, page 143-148. ACM, (2018)Malware Analysis and Classification Using Sequence Alignments., , , , and . Intell. Autom. Soft Comput., 22 (3): 371-377 (2016)Fast malware family detection method using control flow graphs., , , , and . RACS, page 287-292. ACM, (2011)Touch Gesture Data based Authentication Method for Smartphone Users., , and . RACS, page 136-141. ACM, (2016)TASEL: dynamic taint analysis with selective control dependency., , , , and . RACS, page 272-277. ACM, (2014)Real-time malware detection framework in intrusion detection systems., , and . RACS, page 351-352. ACM, (2013)A Study on Similarity Calculation Method for API Invocation Sequences., , and . RSKT, volume 9436 of Lecture Notes in Computer Science, page 492-501. Springer, (2015)A Multimodal Deep Learning Method for Android Malware Detection Using Various Features., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (3): 773-788 (2019)SMDFbs: Specification-Based Misbehavior Detection for False Base Stations., , , , , and . Sensors, 23 (23): 9504 (December 2023)