Author of the publication

A Brief Survey on Rootkit Techniques in Malicious Codes.

, , , , and . J. Internet Serv. Inf. Secur., 2 (3/4): 134-147 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment., , , , , and . IJWGS, 13 (1): 3-24 (2017)Direct Alignment of Draft Model for Speculative Decoding with Chat-Fine-Tuned LLMs., , , , , and . CoRR, (2024)Continuous-Depth Neural Models for Dynamic Graph Prediction., , , , , , and . CoRR, (2021)A 1.5nJ/pixel super-resolution enhanced FAST corner detection processor for high accuracy AR., , , and . ESSCIRC, page 191-194. IEEE, (2014)Online Reinforcement Learning NoC for portable HD object recognition processor., , , , , and . CICC, page 1-4. IEEE, (2012)Convergent Graph Solvers., , and . CoRR, (2021)Learning context-aware adaptive solvers to accelerate quadratic programming., , and . CoRR, (2022)Generating Dispatching Rules for the Interrupting Swap-Allowed Blocking Job Shop Problem Using Graph Neural Network and Reinforcement Learning., , , , and . CoRR, (2023)Neuro CROSS exchange: Learning to CROSS exchange to solve realistic vehicle routing problems., , and . CoRR, (2022)Fuzzy Decision-Based Efficient Task Offloading Management Scheme in Multi-Tier MEC-Enabled Networks., , , , , , and . Sensors, 21 (4): 1484 (2021)