Author of the publication

Metamorphic Viruses' Detection Technique Based on the Equivalent Functional Block Search.

, , , and . ICTERI, volume 1844 of CEUR Workshop Proceedings, page 555-568. CEUR-WS.org, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Technology for Botnets Detection Based on Their Behaviour in the Corporate Area Network., , , , and . CN, volume 718 of Communications in Computer and Information Science, page 166-181. Springer, (2017)Method for Detecting Steganographic Changes in Images Using Machine Learning., , , , and . DESSERT, page 1-6. IEEE, (2023)Blockchain-based Deep Learning Algorithm for Detecting Malware., , , , and . IntelITSIS, volume 3373 of CEUR Workshop Proceedings, page 529-538. CEUR-WS.org, (2023)A Cyberattacks Detection Technique Based on Evolutionary Algorithms., , , and . DESSERT, page 127-132. IEEE, (2020)Botnet Detection Approach for the Distributed Systems., , , and . IDAACS, page 406-411. IEEE, (2019)Method for identifying cyberattacks based on the use of social engineering over the phone., , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 318-329. CEUR-WS.org, (2024)Methods of improving security and resilience of VR systems' architecture., , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 285-304. CEUR-WS.org, (2024)Anti-evasion Technique for the Botnets Detection Based on the Passive DNS Monitoring and Active DNS Probing., , , , and . CN, volume 608 of Communications in Computer and Information Science, page 83-95. Springer, (2016)The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis., , , and . ICTERI Workshops, volume 2104 of CEUR Workshop Proceedings, page 680-687. CEUR-WS.org, (2018)Social Engineering Attacks Detection Approach., , , , , and . DESSERT, page 1-7. IEEE, (2023)