Author of the publication

Obfuscated malicious javascript detection using classification techniques

, , and . Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, page 47 -54. (October 2009)
DOI: 10.1109/MALWARE.2009.5403020

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

You're Not Who You Claim to Be: Website Identity Check for Phishing Detection., , and . ICCCN, page 1-6. IEEE, (2010)Obfuscated malicious javascript detection using classification techniques, , and . Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, page 47 -54. (October 2009)Smart learning of logo detection for mobile phone applications., and . Multimedia Tools Appl., 75 (21): 13211-13233 (2016)Interactive Website Filter for Safe Web Browsing., , and . J. Inf. Sci. Eng., 29 (1): 115-131 (2013)The solid-state drive technology, today and tomorrow., , and . ICDE, page 1520-1522. IEEE Computer Society, (2015)Highly Available Packet Buffer Design With Hybrid Nonvolatile Memory., , , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (11): 2008-2012 (2021)Biscuit: A Framework for Near-Data Processing of Big Data Workloads., , , , , , , , , and 2 other author(s). ISCA, page 153-165. IEEE Computer Society, (2016)Universal Execution of Parallel Processes: Penetrating NATs over the Grid., , , and . International Conference on Computational Science (2), volume 4488 of Lecture Notes in Computer Science, page 577-584. Springer, (2007)2B-SSD: The Case for Dual, Byte- and Block-Addressable Solid-State Drives., , , , , , and . ISCA, page 425-438. IEEE Computer Society, (2018)Obfuscated malicious javascript detection using classification techniques., , and . MALWARE, page 47-54. IEEE Computer Society, (2009)