Author of the publication

Byte Label Malware Classification Using Image Entropy.

, , and . ACSS (2), volume 883 of Advances in Intelligent Systems and Computing, page 17-29. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Byte Label Malware Classification Using Image Entropy., , and . ACSS (2), volume 883 of Advances in Intelligent Systems and Computing, page 17-29. Springer, (2018)Shellmark: A Robust Software Watermarking Tool., , , and . COMAD/CODS, page 260-264. ACM, (2019)Undertaking the tokeneer challenge in event-b., , and . FormaliSE@ICSE, page 8-14. ACM, (2016)A Novel 2.5D Shadow Calculation Algorithm for Urban Environment., , and . GISTAM, page 274-281. SciTePress, (2019)A Distortion Free Watermark Framework for Relational Databases., and . ICSOFT (2), page 229-234. INSTICC Press, (2009)Database Authentication by Distortion Free Watermarking., and . ICSOFT (1), page 219-226. SciTePress, (2010)Property driven program slicing and watermarking in the abstract interpretation framework.. Ca' Foscari University of Venice, Italy, (2011)FireBird: A Fire Alert and Live Fire Monitoring System Based on Social Media Contribution., , , , and . CDVE, volume 12341 of Lecture Notes in Computer Science, page 104-114. Springer, (2020)Distortion-Free Authentication Watermarking., and . ICSOFT (Selected Papers), volume 170 of Communications in Computer and Information Science, page 205-219. Springer, (2010)A Generic Distortion Free Watermarking Technique for Relational Databases., and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 252-264. Springer, (2009)