Author of the publication

Comparison of Three Deep Learning-based Approaches for IoT Malware Detection.

, , , , , and . KSE, page 382-388. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nested Timed Automata with Frozen Clocks., , and . FORMATS, volume 9268 of Lecture Notes in Computer Science, page 189-205. Springer, (2015)Proving Properties of Incremental Merkle Trees., , and . CADE, volume 3632 of Lecture Notes in Computer Science, page 424-440. Springer, (2005)Subtropical Satisfiability., , , and . FroCoS, volume 10483 of Lecture Notes in Computer Science, page 189-206. Springer, (2017)Call-by-need reduction for membership conditional term rewriting Systems.. WRS, volume 86 of Electronic Notes in Theoretical Computer Science, page 673-688. Elsevier, (2003)Checking roundoff errors using counterexample-guided narrowing., and . ASE, page 301-304. ACM, (2010)Proxy Certificate Trust List for Grid Computing., and . Inf. Media Technol., 1 (1): 589-593 (2006)Complete Axiomatization of an Algebraic Construction of Graphs.. FLOPS, volume 2998 of Lecture Notes in Computer Science, page 163-179. Springer, (2004)Iterative-free program analysis., , and . ICFP, page 111-123. ACM, (2003)Make it practical: a generic linear-time algorithm for solving maximum-weightsum problems., , , and . ICFP, page 137-149. ACM, (2000)SIGPLAN Notices 35(9), September 2000.Abstract Interpretation over Infinite Abstract Domains (Tentative Report).. APLAS, page 183-191. (2001)