From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Classic cryptanalysis using hidden Markov models., , , , и . Cryptologia, 41 (1): 1-28 (2017)Hunting for Pirated Software Using Metamorphic Analysis., и . Inf. Secur. J. A Glob. Perspect., 23 (3): 68-85 (2014)Multifamily Malware Models., , и . CoRR, (2022)Static and Dynamic Analysis of Android Malware., , и . ICISSP, стр. 653-662. SciTePress, (2017)Stealthy Ciphertext., , и . International Conference on Internet Computing, стр. 380-388. CSREA Press, (2005)Robustness of Image-Based Malware Analysis., , и . SVCC, том 1683 из Communications in Computer and Information Science, стр. 3-21. Springer, (2022)Acoustic Gait Analysis using Support Vector Machines., , и . ICISSP, стр. 545-552. SciTePress, (2018)Hunting for undetectable metamorphic viruses., и . J. Comput. Virol., 7 (3): 201-214 (2011)Eigenvalue analysis for metamorphic detection., , и . J. Comput. Virol. Hacking Tech., 10 (1): 53-65 (2014)Vigenère scores for malware detection., , и . J. Comput. Virol. Hacking Tech., 14 (2): 157-165 (2018)