Author of the publication

Malicious web page detection based on on-line learning algorithm.

, , , and . ICMLC, page 1914-1919. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting the attributes of social network users using a graph-based machine learning method., , , , and . Computer Communications, (2016)Malware detection based on deep learning algorithm., and . Neural Computing and Applications, 31 (2): 461-472 (2019)Learning to Rank Documents Using Similarity Information between Objects., , , and . ICONIP (2), volume 7063 of Lecture Notes in Computer Science, page 374-381. Springer, (2011)Design and Implementation of Java Just-in-Time Compiler., , and . J. Comput. Sci. Technol., 15 (6): 584-590 (2000)Control flow-based opcode behavior analysis for Malware detection., , , and . Computers & Security, (2014)Malware detection based on objective-oriented association mining., , , , and . ICMLC, page 375-380. IEEE, (2013)Topic optimization method based on Laplace score., and . ICMLC, page 797-802. IEEE, (2015)On-line Hot Topic Recommendation Using Tolerance Rough Set Based Topic Clustering., , , and . JCP, 5 (4): 549-556 (2010)Detecting Android Malware Using Bytecode Image., , and . ICCC, volume 10971 of Lecture Notes in Computer Science, page 164-169. Springer, (2018)Feature representation and selection in malicious code detection methods based on static system calls., , , , and . Computers & Security, 30 (6-7): 514-524 (2011)