From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A hybrid MAC protocol for optimal channel allocation in large-scale wireless powered communication networks., , , и . EURASIP J. Wireless Comm. and Networking, (2018)Android malware classification method: Dalvik bytecode frequency analysis., , , и . RACS, стр. 349-350. ACM, (2013)A Multimodal Deep Learning Method for Android Malware Detection Using Various Features., , , , и . IEEE Trans. Inf. Forensics Secur., 14 (3): 773-788 (2019)N-gram Opcode Analysis for Android Malware Detection., , , и . Int. J. Cyber Situational Aware., 1 (1): 231-255 (2016)Broadening The Solution Space of Feature Selection in Time-interval-based Malware Detection., и . ANT/EDI40, том 220 из Procedia Computer Science, стр. 769-775. Elsevier, (2023)Deep Android Malware Detection., , , , , , , , , и 1 other автор(ы). CODASPY, стр. 301-308. ACM, (2017)Runtime Detection Framework for Android Malware., , и . Mob. Inf. Syst., (2018)Weighted Harvest-Then-Transmit: UAV-Enabled Wireless Powered Communication Networks., , , , и . IEEE Access, (2018)Rule Indexing for Efficient Intrusion Detection Systems., , , и . WISA, том 7115 из Lecture Notes in Computer Science, стр. 136-141. Springer, (2011)Event-Driven Implicit Authentication for Mobile Access Control., , , и . NGMAST, стр. 248-255. IEEE, (2015)