Author of the publication

The Effects of Different Representations on Malware Motif Identification.

, , , and . CIS, page 86-90. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scalable and accurate feature representation method for identifying malicious mobile applications., , , , , and . SAC, page 1182-1189. ACM, (2019)Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort., , , and . CODASPY, page 329-331. ACM, (2021)Hybrid Explainable Intrusion Detection System: Global vs. Local Approach., , , , and . ARTMAN@CCS, page 37-42. ACM, (2023)Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis., and . TrustCom, page 1771-1776. IEEE, (2020)Identity Based Authenticated Key Agreement for Tree-Based Group., , and . IIH-MSP, page 941-944. IEEE Computer Society, (2009)Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow., , and . IIH-MSP, page 644-647. IEEE Computer Society, (2009)Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks., , , and . AsiaJCIS, page 1-7. IEEE, (2022)IoT Malware Detection Using Function-Call-Graph Embedding., , , , and . PST, page 1-9. IEEE, (2021)A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis., , and . ICONIP (2), volume 6444 of Lecture Notes in Computer Science, page 267-274. Springer, (2010)Using Genetic Algorithm to Balance the D-Index Algorithm for Metric Search.. ICONIP (2), volume 4985 of Lecture Notes in Computer Science, page 264-273. Springer, (2007)