Author of the publication

New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory.

, , , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 626-633. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine., , , , and . IJCNN, page 2583-2587. IEEE, (2006)Modeling Viral Agents and Their Dynamics with Persistent Turing Machines and Cellular Automata., , and . PRIMA, volume 4088 of Lecture Notes in Computer Science, page 690-695. Springer, (2006)Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code., , and . FSKD (1), volume 3613 of Lecture Notes in Computer Science, page 629-634. Springer, (2005)Intelligent Detection Computer Viruses Based on Multiple Classifiers., , and . UIC, volume 4611 of Lecture Notes in Computer Science, page 1181-1190. Springer, (2007)Evolvable Viral Agent Modeling and Exploration., , and . ICONIP (3), volume 4234 of Lecture Notes in Computer Science, page 866-873. Springer, (2006)Using RS and SVM to Detect New Malicious Executable Codes., , and . RSKT, volume 4062 of Lecture Notes in Computer Science, page 574-579. Springer, (2006)Malicious Codes Detection Based on Ensemble Learning., , , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 468-477. Springer, (2007)A Computational Model of Computer Worms Based on Persistent Turing Machines., , and . IEEE ICCI, page 453-456. IEEE Computer Society, (2006)New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory., , , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 626-633. Springer, (2006)A Preliminary Study of Coordinated Worm Networks., and . ISECS, page 137-140. IEEE Computer Society, (2008)