Author of the publication

Detection of Malicious Portable Executables Using Evidence Combinational Theory with Fuzzy Hashing.

, , , , and . FiCloud, page 91-98. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control of queueing delay in a buffer with time-varying arrival rate., , and . J. Comput. Syst. Sci., 72 (7): 1238-1248 (2006)A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes., , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 984-995. Springer, (2002)Network-centric strategy for mobile transactions., , and . J. Interconnect. Networks, 5 (3): 329-350 (2004)Performance Modelling of Traffic Congestion in Wireless Networks., , and . J. Interconnect. Networks, 7 (1): 163-178 (2006)Approximate Analysis of Arbitrary Open Networks with HOL Priorities and PBS Scheme., and . ESM, page 741-746. SCS Europe, (1998)Approximate Analysis of Arbitrary QNMs with Space and Service Priorities., and . Modelling and Evaluation of ATM Networks, volume 157 of IFIP Conference Proceedings, page 497-521. Kluwer, (1997)Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures., , and . ACM Trans. Manag. Inf. Syst., 12 (2): 11:1-11:29 (2021)Virtualization in Network Intrusion Detection Systems., , , , , and . OTM Workshops, volume 5872 of Lecture Notes in Computer Science, page 6-8. Springer, (2009)An Efficient Routing Mechanism Based on Heading Angle., , , and . AINA Workshops, page 199-204. IEEE Computer Society, (2009)High Speed NIDS using Dynamic Cluster and Comparator Logic., , , , , and . CIT, page 575-581. IEEE Computer Society, (2010)