Author of the publication

Anomaly-based exploratory analysis and detection of exploits in android mediaserver.

, , , , and . IET Inf. Secur., 12 (5): 404-413 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Deterministic Crowding Evolutionary Algorithm for Optimization of a KNN-based Anomaly Intrusion Detection System., , , and . DMBiz@PAKDD, volume 177 of Frontiers in Artificial Intelligence and Applications, page 111-120. IOS Press, (2007)ADroid: anomaly-based detection of malicious events in Android platforms., , and . Int. J. Inf. Sec., 16 (4): 371-384 (2017)Diagonalizing properties of the discrete cosine transforms., , , , and . IEEE Trans. Signal Process., 43 (11): 2631-2641 (1995)Anomaly-based exploratory analysis and detection of exploits in android mediaserver., , , , and . IET Inf. Secur., 12 (5): 404-413 (2018)A novel zero-trust network access control scheme based on the security profile of devices and users., , , , and . Comput. Networks, (2022)A generalizable dynamic flow pairing method for traffic classification., , , and . Comput. Networks, 57 (14): 2718-2732 (2013)Group-Wise Principal Component Analysis for Exploratory Intrusion Detection., , , , and . IEEE Access, (2019)A voice activated dialogue system for fast-food restaurant applications., , , and . EUROSPEECH, page 1783-1786. ISCA, (1997)A Multiagent Self-healing System against Security Incidents in MANETs., , and . PAAMS (Workshops), volume 430 of Communications in Computer and Information Science, page 321-332. Springer, (2014)On the comparison of speech recognition tasks., , , , and . LREC, page 795-800. European Language Resources Association, (1998)