Author of the publication

FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware.

, , , , , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware., , , , , and . CoRR, (2018)Design and Development of a New Middleware Platform for Mobile Applications., , , and . EuroIMSA, page 434-437. IASTED/ACTA Press, (2005)Integrated Framework for Enhancing Software Development Methodologies With Comparative Analysis., , and . J. Comput. Inf. Sci. Eng., (2014)Determining Robust Solutions in Supply Chain Using Genetic Algorithm., and . DSDE, page 275-277. IEEE Computer Society, (2010)Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features., , , , , and . CoRR, (2024)New chaff point based fuzzy vault for multimodal biometric cryptosystem using particle swarm optimization., and . J. King Saud Univ. Comput. Inf. Sci., 28 (4): 381-394 (2016)Identification of Android malware using refined system calls., , , , , and . Concurr. Comput. Pract. Exp., (2019)Introduction to Special Issue on Recent Trends in Communications and Signal Processing., , and . Comput. Electr. Eng., 39 (3): 971-972 (2013)Implementation of a Time-Out Based Locking Algorithm for Mobile Transactions in XML Databases., and . iiWAS, volume 183 of books@ocg.at, Austrian Computer Society, (2004)