Author of the publication

Exploring Timeline-Based Malware Classification.

, , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 1-13. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new external sorting algorithm with no additional disk space., , , and . Inf. Process. Lett., 86 (5): 229-233 (2003)A tree-based approach to matchmaking algorithms for resource discovery., , and . Int. Journal of Network Management, 18 (5): 427-436 (2008)Variable Block Carry Skip Logic using Reversible Gates, , , , and . CoRR, (2010)A Data Mining Approach to Predict Prospective Business Sectors for Lending in Retail Banking Using Decision Tree., and . CoRR, (2015)New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques, , , and . CoRR, (2010)Wrapper/TAM Co-Optimization and constrained Test Scheduling for SOCs Using Rectangle Bin Packing, , , , and . CoRR, (2010)Uncertainty And Evolutionary Optimization: A Novel Approach., , and . CoRR, (2014)A Novel Approach for the Security Remedial in a Cloud-based E-learning Network., , and . JNW, 9 (11): 2934-2942 (2014)Hybrids of support vector machine wrapper and filter based framework for malware detection., , , , , and . Future Generation Comp. Syst., (2016)A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy., , , , , and . Concurrency and Computation: Practice and Experience, (2017)