Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malicious Code Detection and Acquisition Using Active Learning., , and . ISI, page 371. IEEE, (2007)Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods., , and . Expert Syst. Appl., (2018)Malicious Code Detection Using Active Learning., , and . PinKDD, volume 5456 of Lecture Notes in Computer Science, page 74-91. Springer, (2008)Detecting unknown computer worm activity via support vector machines and active learning., , , and . Pattern Anal. Appl., 15 (4): 459-475 (2012)SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods., , , and . Expert Syst. Appl., (2016)Temporal Probabilistic Profiles for Sepsis Prediction in the ICU., , , and . KDD, page 2961-2969. ACM, (2019)Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods., , , , and . Artificial Intelligence in Medicine, (2017)Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud., , , , and . Computers & Security, (2019)Novel active learning methods for enhanced PC malware detection in windows OS., , , and . Expert Syst. Appl., 41 (13): 5843-5857 (2014)Unknown malcode detection and the imbalance problem., , , , , and . Journal in Computer Virology, 5 (4): 295-308 (2009)