From post

Broadening The Solution Space of Feature Selection in Time-interval-based Malware Detection.

, и . ANT/EDI40, том 220 из Procedia Computer Science, стр. 769-775. Elsevier, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Rule Indexing for Efficient Intrusion Detection Systems., , , и . WISA, том 7115 из Lecture Notes in Computer Science, стр. 136-141. Springer, (2011)Event-Driven Implicit Authentication for Mobile Access Control., , , и . NGMAST, стр. 248-255. IEEE, (2015)Similarity calculation method for user-define functions to detect malware variants., , , , , и . RACS, стр. 236-241. ACM, (2014)Android malware classification method: Dalvik bytecode frequency analysis., , , и . RACS, стр. 349-350. ACM, (2013)N-gram Opcode Analysis for Android Malware Detection., , , и . Int. J. Cyber Situational Aware., 1 (1): 231-255 (2016)A Multimodal Deep Learning Method for Android Malware Detection Using Various Features., , , , и . IEEE Trans. Inf. Forensics Secur., 14 (3): 773-788 (2019)Deep Android Malware Detection., , , , , , , , , и 1 other автор(ы). CODASPY, стр. 301-308. ACM, (2017)Broadening The Solution Space of Feature Selection in Time-interval-based Malware Detection., и . ANT/EDI40, том 220 из Procedia Computer Science, стр. 769-775. Elsevier, (2023)Fast malware family detection method using control flow graphs., , , , и . RACS, стр. 287-292. ACM, (2011)Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection., , и . ICS-CSR, BCS, (2016)