Author of the publication

A Secure Encryption-Based Malware Detection System.

, , , , , and . KSII Trans. Internet Inf. Syst., 12 (4): 1799-1818 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High discriminative SIFT feature and feature pair selection to improve the bag of visual words model., , , , and . IET Image Processing, 11 (11): 994-1001 (2017)The Influencing Factors of Online Consumers' Return Satisfaction., and . WHICEB, page 44. Association for Information Systems, (2016)An Effective Approximation Scheme for Multiconstrained Quality-of-Service Routing., , and . GLOBECOM, page 1-6. IEEE, (2010)Advanced Persistent Threat Detection Method Research Based on Relevant Algorithms to Artificial Immune System., , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 221-228. Springer, (2014)Meta-analysis of Proportions of Rare Events-A Comparison of Exact Likelihood Methods with Robust Variance Estimation., , and . Communications in Statistics - Simulation and Computation, 45 (8): 3036-3052 (2016)Empirical Study on Knowledge Management's Effect on Organizational Effectiveness., and . ICICA (2), volume 106 of Communications in Computer and Information Science, page 80-87. Springer, (2010)SOC Oriented Electrochemical-Thermal Coupled Modeling for Lithium-Ion Battery., , , , and . IEEE Access, (2019)A Sort of Knowledge Metadata Management Model in Semantic Grid Environment., , and . J. Softw., 7 (1): 125-132 (2012)Catheter-Based Polarization Sensitive Optical Coherence Tomography Using Similar Mueller Matrix Method., , , , , , , , and . IEEE Trans. Biomed. Eng., 67 (1): 60-68 (2020)Preliminary Through-Out Research on Parallel-Based Remote Sensing Image Processing., , , and . International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 880-883. Springer, (2006)