Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proof of stake and Proof of work approach for malware detection technologies., , and . IntelITSIS, volume 3156 of CEUR Workshop Proceedings, page 432-441. CEUR-WS.org, (2022)A method for detecting botnets in IT infrastructure using a neural network., , , , and . ICyberPhyS, volume 3736 of CEUR Workshop Proceedings, page 282-292. CEUR-WS.org, (2024)The Approach for IoT Malware Detection Based on Opcodes Sequences Pattern Mining., , , , , , and . IDAACS, page 779-784. IEEE, (2021)Technique for IoT Cyberattacks Detection Based on the Energy Consumption Analysis., , , , and . IntelITSIS, volume 2853 of CEUR Workshop Proceedings, page 514-526. CEUR-WS.org, (2021)Method for Detecting Steganographic Changes in Images Using Machine Learning., , , , and . DESSERT, page 1-6. IEEE, (2023)Blockchain-based Deep Learning Algorithm for Detecting Malware., , , , and . IntelITSIS, volume 3373 of CEUR Workshop Proceedings, page 529-538. CEUR-WS.org, (2023)Technique for IoT Cyberattacks Detection Based on DNS Traffic Analysis., , , , and . IntelITSIS, volume 2623 of CEUR Workshop Proceedings, page 208-218. CEUR-WS.org, (2020)Methods for Detecting Software Implants in Corporate Networks., , , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 270-284. CEUR-WS.org, (2024)