From post

Metamorphic Viruses' Detection Technique Based on the Equivalent Functional Block Search.

, , , и . ICTERI, том 1844 из CEUR Workshop Proceedings, стр. 555-568. CEUR-WS.org, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Cyberattacks Detection Technique Based on Evolutionary Algorithms., , , и . DESSERT, стр. 127-132. IEEE, (2020)Botnet Detection Approach for the Distributed Systems., , , и . IDAACS, стр. 406-411. IEEE, (2019)Information Technology for Botnets Detection Based on Their Behaviour in the Corporate Area Network., , , , и . CN, том 718 из Communications in Computer and Information Science, стр. 166-181. Springer, (2017)Methods of improving security and resilience of VR systems' architecture., , , и . IntelITSIS, том 3675 из CEUR Workshop Proceedings, стр. 285-304. CEUR-WS.org, (2024)Method for identifying cyberattacks based on the use of social engineering over the phone., , , и . IntelITSIS, том 3675 из CEUR Workshop Proceedings, стр. 318-329. CEUR-WS.org, (2024)Method for Detecting Steganographic Changes in Images Using Machine Learning., , , , и . DESSERT, стр. 1-6. IEEE, (2023)Blockchain-based Deep Learning Algorithm for Detecting Malware., , , , и . IntelITSIS, том 3373 из CEUR Workshop Proceedings, стр. 529-538. CEUR-WS.org, (2023)Detecting software implants using system decoys., , , , и . AdvAIT, том 3899 из CEUR Workshop Proceedings, стр. 277-287. CEUR-WS.org, (2024)Strategic priorities of innovation and investment development of the Ukraine's economy industrial sector., , , , , и . M3E2-MLPEED, том 2713 из CEUR Workshop Proceedings, стр. 145-166. CEUR-WS.org, (2020)Approach for the unknown metamorphic virus detection., , , и . IDAACS, стр. 71-76. IEEE, (2017)