Author of the publication

Automatic Detection and Analysis of Encrypted Messages in Malware.

, , , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 101-117. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study of Cohesion and Coupling: Balancing Optimization and Disruption., , , and . IEEE Trans. Evolutionary Computation, 22 (3): 394-414 (2018)Multishot person reidentification using joint group sparse representation., , , and . J. Electronic Imaging, 27 (06): 063012 (2018)A Secure Data Deduplication Scheme Based on Differential Privacy., , , , and . ICPADS, page 1241-1246. IEEE, (2016)Estimate PM2.5 concentration in 500m resolution from satellite data and ground observation., , , , , and . IGARSS, page 5716-5719. IEEE, (2016)Predicting pilot behavior during midair encounters using recognition primed decision model., , and . Inf. Sci., (2018)A measurement study of a campus Wi-Fi network with mixed handheld and non-handheld traffic., , , , , , and . CCECE, page 848-853. IEEE, (2015)Optimal Control of Mixed-state Quantum Systems based on Lyapunov Method., , and . BIOSIGNALS, page 22-30. SciTePress, (2011)An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment., , and . Wireless Personal Communications, 85 (3): 1399-1409 (2015)NDDVD: an integrated and manually curated Neurodegenerative Diseases Variation Database., , , , , , , and . Database, (2018)The Value of Exact Analysis in Requirements Selection., , , and . IEEE Trans. Software Eng., 43 (6): 580-596 (2017)