Author of the publication

Evaluation the Efficiency of Information Technology of Big Data Intelligence Analysis and Processing.

, , , , , , and . COLINS, volume 3171 of CEUR Workshop Proceedings, page 1087-1096. CEUR-WS.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Apple Detection with Occlusions Using Modified YOLOv5-v1., , and . IDAACS, page 107-112. IEEE, (2023)Malware Detection Tool Based on Emulator State Analysis., , , and . IDAACS, page 135-140. IEEE, (2023)An Android Malware Detection Method Based on CNN Mixed-Data Model., , , and . ICTERI Workshops, volume 2732 of CEUR Workshop Proceedings, page 198-213. CEUR-WS.org, (2020)Dynamic Signature-based Malware Detection Technique Based on API Call Tracing., , , and . ICTERI Workshops, volume 2393 of CEUR Workshop Proceedings, page 633-643. CEUR-WS.org, (2019)Metamorphic Viruses Detection Technique Based on the the Modified Emulators., , , and . ICTERI, volume 1614 of CEUR Workshop Proceedings, page 375-383. CEUR-WS.org, (2016)Metamorphic Viruses' Detection Technique Based on the Equivalent Functional Block Search., , , and . ICTERI, volume 1844 of CEUR Workshop Proceedings, page 555-568. CEUR-WS.org, (2017)A trust model that ensures the correctness of computing in grid computing system., , , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 388-401. CEUR-WS.org, (2024)Botnet Detection Approach based on the Distributed Systems., , , , and . Int. J. Comput., (2020)Anti-evasion Technique for the Botnets Detection Based on the Passive DNS Monitoring and Active DNS Probing., , , , and . CN, volume 608 of Communications in Computer and Information Science, page 83-95. Springer, (2016)The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis., , , and . ICTERI Workshops, volume 2104 of CEUR Workshop Proceedings, page 680-687. CEUR-WS.org, (2018)