Author of the publication

Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph.

, , , , and . CoRR, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the uncertainty of disaster tweets and its effect on retweeting: The perspectives of uncertainty reduction theory and information entropy., , , and . J. Assoc. Inf. Sci. Technol., 71 (10): 1145-1161 (2020)No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games., , , and . WWW, page 1825-1834. ACM, (2018)SwahBERT: Language Model of Swahili., , , and . NAACL-HLT, page 303-313. Association for Computational Linguistics, (2022)An event-driven SIR model for topic diffusion in web forums., and . ISI, page 108-113. IEEE, (2012)Modeling of bot usage diffusion across social networks in MMORPGs., , and . WASA, page 13-18. ACM, (2012)Andro-profiler: anti-malware system based on behavior profiling of mobile malware., , , and . WWW (Companion Volume), page 737-738. ACM, (2014)"I know what you did before": General framework for correlation analysis of cyber threat incidents., , and . MILCOM, page 782-787. IEEE, (2016)Detecting and Preventing Online Game Bots in MMORPGs., and . Encyclopedia of Computer Graphics and Games, Springer, Living reference work, snapshot April 2019.(2019)Developing an Individual Glucose Prediction Model Using Recurrent Neural Network., , , , , , , and . Sensors, 20 (22): 6460 (2020)Prediction of Churning Game Users Based on Social Activity and Churn Graph Neural Networks., , and . IEEE Access, (2024)