Author of the publication

Hybrids of support vector machine wrapper and filter based framework for malware detection.

, , , , , and . Future Generation Comp. Syst., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-cluster computing interconnection network performance modeling and analysis., , and . Future Generation Comp. Syst., 25 (7): 737-746 (2009)Analytical communication networks model for enterprise Grid computing., , and . Future Generation Comp. Syst., 23 (6): 737-747 (2007)Failure-aware resource provisioning for hybrid Cloud infrastructure., , and . J. Parallel Distrib. Comput., 72 (10): 1318-1331 (2012)Security and privacy threats to volunteer computing.. IJCIS, 4 (3): 245-255 (2008)Taxonomy and Survey of Location Management Systems., , and . ACIS-ICIS, page 369-374. IEEE Computer Society, (2007)IPMA: Indirect Patterns Mining Algorithm., , , , and . Advanced Methods for Computational Collective Intelligence, volume 457 of Studies in Computational Intelligence, Springer, (2013)Economy-Based Data Replication Broker., , and . e-Science, page 90. IEEE Computer Society, (2006)Performance Analysis of Cyber Security Awareness Delivery Methods., and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 142-148. Springer, (2010)A Hybrid Mutual Authentication Protocol for RFID., and . MobiQuitous, volume 73 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 310-311. Springer, (2010)A new Internet meta-search engine and implementation., and . AICCSA, page 103. IEEE Computer Society, (2005)