From post

The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis.

, , , и . ICTERI Workshops, том 2104 из CEUR Workshop Proceedings, стр. 680-687. CEUR-WS.org, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A graph-based vulnerability detection method., , , , и . IntelITSIS, том 3675 из CEUR Workshop Proceedings, стр. 343-355. CEUR-WS.org, (2024)Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication., , , , и . IntelITSIS, том 2623 из CEUR Workshop Proceedings, стр. 239-251. CEUR-WS.org, (2020)Behavioral Model of a Smart Grid Cyberphysical System Functioning under the Influence of MitM Cyberattacks., , и . IntelITSIS, том 3373 из CEUR Workshop Proceedings, стр. 628-637. CEUR-WS.org, (2023)Application of Multifactor Analysis for the Purpose of Detecting Malicious Software Implants of the Software in Local Computer Networks., , , , и . IntelITSIS, том 2853 из CEUR Workshop Proceedings, стр. 417-426. CEUR-WS.org, (2021)A Technique for Detection of Bots Which Are Using Polymorphic Code., , , , и . CN, том 431 из Communications in Computer and Information Science, стр. 265-276. Springer, (2014)Method of detecting cyberattacks on communication channels based on spectral clustering and machine learning methods., , , и . IntelITSIS, том 3675 из CEUR Workshop Proceedings, стр. 375-387. CEUR-WS.org, (2024)Detecting Software Malicious Implant Based on Anomalies Research on Local Area Networks., , , , и . IntelITSIS, том 2623 из CEUR Workshop Proceedings, стр. 194-207. CEUR-WS.org, (2020)Centralized distributed system for cyberattack detection in corporate network based on multifractal analysis., , , , и . IntelITSIS, том 3156 из CEUR Workshop Proceedings, стр. 421-431. CEUR-WS.org, (2022)A Framework for Detection of MitM Cyberattacks in Smart Grid Networks Based on the Application of the Ensemble Process for Feature Selection., , , и . DESSERT, стр. 1-8. IEEE, (2023)SVM-based Technique for Mobile Malware Detection., , , и . CMIS, том 2353 из CEUR Workshop Proceedings, стр. 85-97. CEUR-WS.org, (2019)