Author of the publication

A layered classification for malicious function identification and malware detection.

, , , and . Concurrency and Computation: Practice and Experience, 24 (11): 1169-1179 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Carbon-based sleep switch dynamic logic circuits with variable strength keeper for lower-leakage currents and higher-speed., and . ISCAS, page 2720-2723. IEEE, (2015)Combining electric vehicle and rechargeable battery for household load hiding., , and . SmartGridComm, page 611-616. IEEE, (2015)Automatically Evolving CNN Architectures Based on Blocks., , and . CoRR, (2018)A Layered Detection Method for Malware Identification., , , and . NPC, volume 6985 of Lecture Notes in Computer Science, page 166-175. Springer, (2011)Stability and convergence analysis of the quadratic spline collocation method for time-dependent fractional diffusion equations., , , , and . Applied Mathematics and Computation, (2019)IGD Indicator-based Evolutionary Algorithm for Many-objective Optimization Problems., , and . CoRR, (2018)SEDE: state estimation-based dynamic encryption scheme for smart grid communication., , , , , and . SAC, page 539-544. ACM, (2014)The influence of visual information on auditory processing in individuals with congenital amusia: An ERP study., , , , and . NeuroImage, (2016)IGD Indicator-Based Evolutionary Algorithm for Many-Objective Optimization Problems., , and . IEEE Trans. Evolutionary Computation, 23 (2): 173-187 (2019)Explicit guiding auto-encoders for learning meaningful representation., , , and . Neural Computing and Applications, 28 (3): 429-436 (2017)