Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Altas, Irfan
add a person with the name Altas, Irfan
 

Other publications of authors with the same name

Implementing Microsoft PiL in Australian Schools., , and . iJET, 3 (2): 63-68 (2008)Web Personalisation with the Cover Coefficient Algorithm., , and . International Conference on Computational Science, volume 2659 of Lecture Notes in Computer Science, page 422-431. Springer, (2003)A parallel finite element surface fitting algorithm for data mining., , , , , and . PARCO, page 275-282. Imperial College Press, (1999)Romberg Integration: A Symbolic Approach with Mathematica., , and . International Conference on Computational Science, volume 2657 of Lecture Notes in Computer Science, page 691-700. Springer, (2003)A Comparative Study of Malware Family Classification., and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 488-496. Springer, (2012)Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI)., , and . ARES, page 689-695. IEEE Computer Society, (2010)A Survey on Mining Program-Graph Features for Malware Analysis., , , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 220-236. Springer, (2014)The Integrated Delivery of Large-Scale Data Mining: The ACSys Data Mining Project., , , , , , , , and . Large-Scale Parallel Data Mining, volume 1759 of Lecture Notes in Computer Science, page 24-55. Springer, (1999)Scalable parallel algorithms for surface fitting and data mining., , , , , and . Parallel Computing, 27 (7): 941-961 (2001)Exploring Timeline-Based Malware Classification., , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 1-13. Springer, (2013)