Author of the publication

APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework.

, , , , and . Inf. Sci., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WHGDroid: Effective android malware detection based on weighted heterogeneous graph., , , , , and . J. Inf. Secur. Appl., (September 2023)Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine., , and . IET Inf. Secur., 13 (2): 109-116 (2019)Class Level Research on Modifying Information Transmission Path of the Cooperative Network Based on the Cohesion of Class., , , and . FSDM, volume 299 of Frontiers in Artificial Intelligence and Applications, page 494-510. IOS Press, (2017)A Novel Malware Detection Approach Based on Behavioral Semantic Analysis and LSTM Model., , and . ICCT, page 339-343. IEEE, (2021)An Online Approach to Defeating Return-Oriented-Programming Attacks., , , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 236-247. Springer, (2017)A Detecting Method of Array Bounds Defects Based on Symbolic Execution., , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 373-385. Springer, (2017)Malware Visualization for Fine-Grained Classification., , , , and . IEEE Access, (2018)Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research Smoothly., , , , and . IEEE Access, (2019)Research on Network Risk Evaluation Method Based on a Differential Manifold., , , , and . IEEE Access, (2020)Blockchain-based Reputation Evaluation Using Game Theory in Social Networking., , , and . BSCI, page 107-114. ACM, (2022)