From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection and prevention of LeNa Malware on Android., , и . J. Internet Serv. Inf. Secur., 3 (3/4): 63-71 (2013)Efficient Android Malware Detection Using API Rank and Machine Learning., , , , и . J. Internet Serv. Inf. Secur., 9 (1): 48-59 (2019)A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications., , , , , , , и . IMIS, стр. 723-728. IEEE Computer Society, (2013)Efficient Identification of Windows Executable Programs to Prevent Software Piracy., , , , и . IMIS, стр. 236-240. IEEE Computer Society, (2014)Protecting data on android platform against privilege escalation attack., , , и . Int. J. Comput. Math., 93 (2): 401-414 (2016)Measuring similarity of windows applications using static and dynamic birthmarks., , , , , , , и . SAC, стр. 1628-1633. ACM, (2013)An effective and intelligent Windows application filtering system using software similarity., , , , , , и . Soft Comput., 20 (5): 1821-1827 (2016)Enhancing Sustainability in Machine Learning-based Android Malware Detection using API calls., , , , и . AIKE, стр. 131-134. IEEE, (2022)DAAV: Dynamic API Authority Vectors for Detecting Software Theft., , , и . CIKM, стр. 1819-1822. ACM, (2015)Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)., , , , и . IEEE Access, (2022)