Author of the publication

Ransomware Detection Based on an Improved Double-Layer Negative Selection Algorithm.

, , , and . TRIDENTCOM, volume 309 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 46-61. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Static detection of Android malware based on improved random forest algorithm., , , and . ISI, page 200. IEEE, (2017)Android Malware Detection Based on a Hybrid Deep Learning Model., , , , and . Secur. Commun. Networks, (2020)Research on the Relationship Between Chinese Nicknames and Accounts in Social Networks., , , and . CNCERT, volume 1506 of Communications in Computer and Information Science, page 143-156. Springer, (2021)Design and Implementation of a Cloud Based Forensic Science Information System Model., and . CSC, page 140-145. IEEE Computer Society, (2013)Mitigating data imbalance to improve the generalizability in IoT DDoS detection tasks., , and . J. Supercomput., 80 (7): 9935-9960 (May 2024)Suggestions to digital forensics in Cloud computing ERA., , , and . IC-NIDC, page 540-544. IEEE, (2012)Aggregating vulnerability metrics in enterprise networks using attack graphs., , , , , , and . J. Comput. Secur., 21 (4): 561-597 (2013)IoT Device Identification Using Directional Packet Length Sequences and 1D-CNN., , and . Sensors, 22 (21): 8337 (2022)EM-YOLO: An X-ray Prohibited-Item-Detection Method Based on Edge and Material Information Fusion., , , and . Sensors, 23 (20): 8555 (October 2023)A Data Enhancement Algorithm for DDoS Attacks Using IoT., , , , and . Sensors, 23 (17): 7496 (September 2023)