Author of the publication

Cyber Threat Intelligence for Proactive Defense against Adversary in SDN-assisted IIoTs context.

, , , , , , and . RIVF, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multimodal Deep Learning Approach for Efficient Vulnerability Detection in Smart Contracts., , , , , , and . GLOBECOM, page 3421-3426. IEEE, (2023)Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN., , , , and . ISCIT, page 27-32. IEEE, (2022)AAGAN: Android Malware Generation System Based on Generative Adversarial Network., , , , and . Vietnam. J. Comput. Sci., 11 (2): 275-299 (May 2024)Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware Detectors., , , , , and . SoICT, page 31-38. ACM, (2022)Detect Android malware by using deep learning: Experiment and Evaluation., , , and . ICMLSC, page 129-134. ACM, (2021)uitXkernel: Android Kernel Forensic for Security Analysis Purposes., , , and . ICO, page 1148-1158. (2022)UIT-ADF: A System for Android Device Forensics., , , , , and . ICO, page 290-299. (2022)Cyber Threat Intelligence for Proactive Defense against Adversary in SDN-assisted IIoTs context., , , , , , and . RIVF, page 1-6. IEEE, (2022)Forensic analysis of TikTok application to seek digital artifacts on Android smartphone., , , , and . RIVF, page 1-5. IEEE, (2020)Proposing Automatic Dataset Generation System to Support Android Sensitive Data Leakage Detection Systems., , , , and . ICCAI, page 78-83. ACM, (2019)