From post

Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.

, , , , , и . ICICS, том 12282 из Lecture Notes in Computer Science, стр. 443-461. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Companion Paper for., , , , , , , , и . ACM Multimedia, стр. 1085-1088. ACM, (2019)VirusMeter: Preventing Your Cellphone from Spies., , , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 244-264. Springer, (2009)Capturing DDoS Attack Dynamics Behind the Scenes., , , и . DIMVA, том 9148 из Lecture Notes in Computer Science, стр. 205-215. Springer, (2015)From Blue-Sky to Practical Adversarial Learning., , , , и . TPS-ISA, стр. 118-127. IEEE, (2020)Does internet media traffic really follow Zipf-like distribution?, , , , и . SIGMETRICS, стр. 359-360. ACM, (2007)Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs., , , , , , , и . MILCOM, стр. 904-909. IEEE, (2021)Evaluating and improving push based video streaming with HTTP/2., , , и . NOSSDAV, стр. 3:1-3:6. ACM, (2016)DaTA - Data-Transparent Authentication Without Communication Overhead., , , и . SecureComm, стр. 1-10. IEEE, (2006)Towards Optimal Resource Utilization in Heterogeneous P2P Streaming., , и . ICDCS, стр. 352-359. IEEE Computer Society, (2009)Adaptive and Virtual Reconfigurations for Effective Dynamic Job Scheduling in Cluster Systems., , и . ICDCS, стр. 35-42. IEEE Computer Society, (2002)