Author of the publication

A Technique for Detection of Bots Which Are Using Polymorphic Code.

, , , , and . CN, volume 431 of Communications in Computer and Information Science, page 265-276. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MASTAC: new curriculum for master and doctoral studies in critical software and computing., , , , , and . SEESE@ICSE, page 59-64. ACM, (2008)DNS-based anti-evasion technique for botnets detection., , , , and . IDAACS, page 453-458. IEEE, (2015)The way to detection of software emergent properties., and . IDAACS, page 779-784. IEEE, (2015)A Technique for Detection of Bots Which Are Using Polymorphic Code., , , , and . CN, volume 431 of Communications in Computer and Information Science, page 265-276. Springer, (2014)Integration of Artificial Neural Networks for identification of Computer Systems States.. Int. J. Comput., 5 (2): 31-42 (2006)Anti-evasion Technique for the Botnets Detection Based on the Passive DNS Monitoring and Active DNS Probing., , , , and . CN, volume 608 of Communications in Computer and Information Science, page 83-95. Springer, (2016)Metamorphic Viruses Detection Technique Based on the the Modified Emulators., , , and . ICTERI, volume 1614 of CEUR Workshop Proceedings, page 375-383. CEUR-WS.org, (2016)Ontological Approach to the Assessment of Information Sufficiency for Software Quality Determination., and . ICTERI, volume 1614 of CEUR Workshop Proceedings, page 332-348. CEUR-WS.org, (2016)Research of artificial neural network's component of software quality evaluation and prediction method., and . IDAACS (2), page 959-962. IEEE, (2011)978-1-4577-1426-9.The Problems of Information Defence in Diagnosis Intelligent Systems of Microprocessor Devices., and . Int. J. Comput., 4 (2): 46-53 (2005)