Author of the publication

SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection.

, , , , , , and . ISC, volume 14411 of Lecture Notes in Computer Science, page 59-78. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

P-Prolog: A Parallel Logic Language Based on Exclusive Relation., and . ICLP, volume 225 of Lecture Notes in Computer Science, page 255-269. Springer, (1986)Game Theory and Human Behavior: Challenges in Security and Sustainability., , , , , and . ADT, volume 6992 of Lecture Notes in Computer Science, page 320-330. Springer, (2011)Line-Breeding Schemes for Combinatorial Optimization.. PPSN, volume 1498 of Lecture Notes in Computer Science, page 448-460. Springer, (1998)Design optimization of a global/local tone mapping processor on arm SOC platform for real-time high dynamic range video., , , , , , and . ICIP, page 1400-1403. IEEE, (2008)Life-Sketch - A Framework for Sketch-Based Modelling and Animation of 3D Objects., and . AUIC, volume 106 of CRPIT, page 61-70. Australian Computer Society, (2010)Integrity Attack With Takeover Local Objects On Multi-agent Cluster Systems., , , , , and . ISIE, page 1257-1262. IEEE, (2019)Adaptive target altitude estimation using multipath for 2D radar on spherical earth., and . CAMSAP, page 113-116. IEEE, (2015)RF emitter localization and beam pattern auto-calibration using amplitude comparison of a two-element array., , and . CAMSAP, page 313-316. IEEE, (2015)WTDM-Based M3H Filter for Target Tracking in the Presence of Outliers., , and . IEEE Signal Process. Lett., 17 (7): 623-626 (2010)Improved computational models of human behavior in security games., , , , and . AAMAS, page 1155-1156. IFAAMAS, (2011)