Author of the publication

Malware Detection in Android-Based Mobile Environments Using Optimum-Path Forest.

, , , , , and . ICMLA, page 754-759. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spam intrusion detection in computer networks using intelligent techniques., , and . IM, page 1357-1360. IEEE, (2015)Unsupervised Breast Masses Classification through Optimum-Path Forest., , , , , and . CBMS, page 238-243. IEEE Computer Society, (2015)Malware Detection in Android-Based Mobile Environments Using Optimum-Path Forest., , , , , and . ICMLA, page 754-759. IEEE, (2015)A Survey of e-Biodiversity: Concepts, Practices, and Challenges., , , , , , , , , and 3 other author(s). CoRR, (2018)Reengineering IT Infrastructures: A Method for Topology Discovery., and . QUATIC, page 331-336. IEEE Computer Society, (2010)Exploring and Overcoming Major Challenges in IT Infrastructures Faced by IT Executives., and . ICSEA, page 576-581. IEEE Computer Society, (2009)Software distribution to remote locations., and . EuroPLoP, page 20. ACM, (2010)Model-R: A Framework for Scalable and Reproducible Ecological Niche Modeling., , , , , , , and . CARLA, volume 796 of Communications in Computer and Information Science, page 218-232. Springer, (2017)An IT Infrastructure Patterns Approach to Improve IT Service Management Quality., and . QUATIC, page 171-176. IEEE Computer Society, (2010)Analysis and visualization of the geographical distribution of atlantic forest bromeliads species., , , , , , and . CIDM, page 375-380. IEEE, (2009)