From post

The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis.

, , , и . ICTERI Workshops, том 2104 из CEUR Workshop Proceedings, стр. 680-687. CEUR-WS.org, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication., , , , и . IntelITSIS, том 2623 из CEUR Workshop Proceedings, стр. 239-251. CEUR-WS.org, (2020)A graph-based vulnerability detection method., , , , и . IntelITSIS, том 3675 из CEUR Workshop Proceedings, стр. 343-355. CEUR-WS.org, (2024)Detecting Software Malicious Implant Based on Anomalies Research on Local Area Networks., , , , и . IntelITSIS, том 2623 из CEUR Workshop Proceedings, стр. 194-207. CEUR-WS.org, (2020)Centralized distributed system for cyberattack detection in corporate network based on multifractal analysis., , , , и . IntelITSIS, том 3156 из CEUR Workshop Proceedings, стр. 421-431. CEUR-WS.org, (2022)A Framework for Detection of MitM Cyberattacks in Smart Grid Networks Based on the Application of the Ensemble Process for Feature Selection., , , и . DESSERT, стр. 1-8. IEEE, (2023)The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis., , , и . ICTERI Workshops, том 2104 из CEUR Workshop Proceedings, стр. 680-687. CEUR-WS.org, (2018)Approach for the unknown metamorphic virus detection., , , и . IDAACS, стр. 71-76. IEEE, (2017)SVM-based Technique for Mobile Malware Detection., , , и . CMIS, том 2353 из CEUR Workshop Proceedings, стр. 85-97. CEUR-WS.org, (2019)Subsystem of anomaly detection in the Smart House system based on machine learning., , , , и . ICyberPhyS, том 3736 из CEUR Workshop Proceedings, стр. 339-350. CEUR-WS.org, (2024)Detection and prediction of the vulnerabilities in software systems based on behavioral analysis with machine learning., , , , и . ICyberPhyS, том 3736 из CEUR Workshop Proceedings, стр. 239-254. CEUR-WS.org, (2024)