Author of the publication

A Malware Classification Method Based on Generic Malware Information.

, , , and . ICONIP (2), volume 9490 of Lecture Notes in Computer Science, page 329-336. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software., , , and . AsiaJCIS, page 5-9. IEEE Computer Society, (2017)Visualization of Intrusion Detection Alarms Collected from Multiple Networks., , , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 437-454. Springer, (2017)Enhanced Film Grain Noise Removal and Synthesis for High Fidelity Video Coding., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (11): 2253-2264 (2013)Visualization of security event logs across multiple networks and its application to a CSOC., , , and . Clust. Comput., 22 (Suppl 1): 1861-1872 (2019)Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers., , , , , and . Peer Peer Netw. Appl., 11 (6): 1206-1216 (2018)A Malware Collection and Analysis Framework Based on Darknet Traffic., , and . ICONIP (2), volume 7664 of Lecture Notes in Computer Science, page 624-631. Springer, (2012)Agent-based product-support logistics system using XML and RDF., , , and . Int. J. Systems Science, 33 (6): 467-484 (2002)An Adaptive Base Plane Filtering Algorithm for Inter-plane Estimation of RGB Images in HEVC RExt., and . IEICE Trans. Inf. Syst., 97-D (6): 1686-1689 (2014)A Malware Classification Method Based on Generic Malware Information., , , and . ICONIP (2), volume 9490 of Lecture Notes in Computer Science, page 329-336. Springer, (2015)MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environment., , , , , and . PST, volume 380 of ACM International Conference Proceeding Series, page 53. ACM, (2006)