Author of the publication

SVM-based Technique for Mobile Malware Detection.

, , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 85-97. CEUR-WS.org, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A graph-based vulnerability detection method., , , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 343-355. CEUR-WS.org, (2024)Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication., , , , and . IntelITSIS, volume 2623 of CEUR Workshop Proceedings, page 239-251. CEUR-WS.org, (2020)Method of detecting cyberattacks on communication channels based on spectral clustering and machine learning methods., , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 375-387. CEUR-WS.org, (2024)Behavioral Model of a Smart Grid Cyberphysical System Functioning under the Influence of MitM Cyberattacks., , and . IntelITSIS, volume 3373 of CEUR Workshop Proceedings, page 628-637. CEUR-WS.org, (2023)Application of Multifactor Analysis for the Purpose of Detecting Malicious Software Implants of the Software in Local Computer Networks., , , , and . IntelITSIS, volume 2853 of CEUR Workshop Proceedings, page 417-426. CEUR-WS.org, (2021)A Technique for Detection of Bots Which Are Using Polymorphic Code., , , , and . CN, volume 431 of Communications in Computer and Information Science, page 265-276. Springer, (2014)A Framework for Detection of MitM Cyberattacks in Smart Grid Networks Based on the Application of the Ensemble Process for Feature Selection., , , and . DESSERT, page 1-8. IEEE, (2023)Detecting Software Malicious Implant Based on Anomalies Research on Local Area Networks., , , , and . IntelITSIS, volume 2623 of CEUR Workshop Proceedings, page 194-207. CEUR-WS.org, (2020)Centralized distributed system for cyberattack detection in corporate network based on multifractal analysis., , , , and . IntelITSIS, volume 3156 of CEUR Workshop Proceedings, page 421-431. CEUR-WS.org, (2022)The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis., , , and . ICTERI Workshops, volume 2104 of CEUR Workshop Proceedings, page 680-687. CEUR-WS.org, (2018)