From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

NLP-Based Techniques for Cyber Threat Intelligence., , , , , , и . CoRR, (2023)Identification of malicious android app using manifest and opcode features., , и . J. Comput. Virol. Hacking Tech., 13 (2): 125-138 (2017)Heterogeneous feature space for Android malware detection., , и . IC3, стр. 383-388. IEEE Computer Society, (2015)Multi-Domain Network Traffic Analysis using Machine Learning and Deep Learning Techniques., , , , , , , , и . IC3, стр. 305-312. ACM, (2022)Linux Malware Detection Using eXtended-Symmetric Uncertainty., и . SPACE, том 8804 из Lecture Notes in Computer Science, стр. 319-332. Springer, (2014)Assessing motion-coherency in video watermarking., , и . MM&Sec, стр. 114-119. ACM, (2006)X-ANOVA and X-Utest features for Android malware analysis., , и . ICACCI, стр. 1643-1649. IEEE, (2014)SeCTIS: A Framework to Secure CTI Sharing., , , , , , и . CoRR, (2024)Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN., , , , , , , , и . IEEE Syst. J., 17 (2): 2756-2766 (июня 2023)A machine learning based approach to detect malicious android apps using discriminant system calls., , и . Future Gener. Comput. Syst., (2019)