From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Effective and efficient detection of software theft via dynamic API authority vectors., , , и . J. Syst. Softw., (2015)Layered Information Structure for Hierarchical Security Management of Critical Infrastructure Using Network Security Appliances., , , , и . HCI (33), том 1032 из Communications in Computer and Information Science, стр. 197-204. Springer, (2019)Real-Time Detection of Electric Field Signal of a Moving Object Using Adjustable Frequency Bands and Statistical Discriminant for Underwater Defense., , и . IEEE Trans. Geosci. Remote. Sens., (2022)Identifying Windows Installer Package Files for Detection of Pirated Software., , , , , и . IMIS, стр. 287-290. IEEE Computer Society, (2014)Machine learning-based software classification scheme for efficient program similarity analysis., , , , , и . RACS, стр. 114-118. ACM, (2015)A Static Birthmark of Windows Binary Executables Based on Strings., , , , , , и . IMIS, стр. 734-738. IEEE Computer Society, (2013)Data-Driven Field Mapping of Security Logs for Integrated Monitoring., , , , и . Critical Infrastructure Protection, том 570 из IFIP Advances in Information and Communication Technology, стр. 253-268. Springer, (2019)An effective and intelligent Windows application filtering system using software similarity., , , , , , и . Soft Comput., 20 (5): 1821-1827 (2016)Efficient Identification of Windows Executable Programs to Prevent Software Piracy., , , , и . IMIS, стр. 236-240. IEEE Computer Society, (2014)DAAV: Dynamic API Authority Vectors for Detecting Software Theft., , , и . CIKM, стр. 1819-1822. ACM, (2015)