Author of the publication

The Effects of Different Representations on Malware Motif Identification.

, , , and . CIS, page 86-90. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing support vector machine ensemble, , , , and . Pattern Recognition, 36 (12): 2757-2767 (2003)Factorizing Class Characteristics via Group MEBs Construction., , and . ICONIP (2), volume 6444 of Lecture Notes in Computer Science, page 283-290. Springer, (2010)Spanning SVM Tree for Personalized Transductive Learning., , , and . ICANN (1), volume 5768 of Lecture Notes in Computer Science, page 913-922. Springer, (2009)Hierarchical Core Vector Machines for Network Intrusion Detection., , , , and . ICONIP (2), volume 5864 of Lecture Notes in Computer Science, page 520-529. Springer, (2009)COR-Honeypot: Copy-On-Risk, Virtual Machine as Honeypot in the Cloud., , , , and . CLOUD, page 908-912. IEEE Computer Society, (2016)Incremental and decremental LDA learning with applications., , , and . IJCNN, page 1-8. IEEE, (2010)A federated network online network traffics analysis engine for cybersecurity., , , , and . IJCNN, page 1-8. IEEE, (2015)r-SVMT: Discovering the knowledge of association rule over SVM classification trees., and . IJCNN, page 2486-2493. IEEE, (2008)S-boxes Construction Based on Quantum Chaos and PWLCM Chaotic Mapping., , , , , and . ICCI*CC, page 1-6. IEEE, (2019)A Novel Microarray Gene Selection Method Based on Consistency., , and . HIS, page 14. IEEE Computer Society, (2006)