Author of the publication

Hybrids of support vector machine wrapper and filter based framework for malware detection.

, , , , , and . Future Gener. Comput. Syst., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From ZeuS to Zitmo: Trends in Banking Malware., , and . TrustCom/BigDataSE/ISPA (1), page 1386-1391. IEEE, (2015)IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges., , , , , and . IEEE Access, (2020)CroLSSim: Cross-language software similarity detector using hybrid approach of LSA-based AST-MDrep features and CNN-LSTM model., , , , and . Int. J. Intell. Syst., 37 (9): 5768-5795 (2022)Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT., , , and . IEEE Trans. Ind. Informatics, 17 (12): 8442-8452 (2021)Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery., , , , , and . IEEE Trans. Ind. Informatics, 19 (4): 5593-5601 (April 2023)Federated Learning for Cybersecurity: Concepts, Challenges, and Future Directions., , , , , and . IEEE Trans. Ind. Informatics, 18 (5): 3501-3509 (2022)Detecting malicious behaviour using supervised learning algorithms of the function calls., and . Int. J. Electron. Secur. Digit. Forensics, 5 (2): 90-109 (2013)Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks., , , , and . TrustCom, page 599-606. IEEE, (2020)Network Flow based IoT Botnet Attack Detection using Deep Learning., , , and . INFOCOM Workshops, page 189-194. IEEE, (2020)Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud., , , , , and . ICICS, volume 13407 of Lecture Notes in Computer Science, page 261-280. Springer, (2022)