Author of the publication

Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware.

, , , , and . Future Internet, 15 (6): 214 (June 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Controlling information behaviour: the case for access control., and . Behav. Inf. Technol., 35 (4): 268-276 (2016)Automated measurement of attitudes towards social distancing using social media: A COVID-19 case study., , , , and . First Monday, (2020)A methodology for estimating the tangible cost of data breaches., and . J. Inf. Secur. Appl., 19 (6): 321-330 (2014)The Maximum Degree & Diameter-Bounded Subgraph and its Applications., , , and . J. Math. Model. Algorithms, 11 (3): 249-268 (2012)REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery., , , , and . AI Commun., 29 (1): 107-122 (2016)Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics., , , , , , and . Future Gener. Comput. Syst., (2021)Dynamic user-centric access control for detection of ransomware attacks., , , , and . Comput. Secur., (2021)Rapid Anomaly Detection Using Integrated Prudence Analysis (IPA)., , , and . PAKDD (Workshops), volume 11154 of Lecture Notes in Computer Science, page 137-141. Springer, (2018)Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation Materials.. PAKDD (Workshops), volume 11154 of Lecture Notes in Computer Science, page 318-329. Springer, (2018)Automatically determining phishing campaigns using the USCAP methodology., , and . eCrime, page 1-8. IEEE, (2010)