Author of the publication

Detection of unknown malicious script code using a conceptual graph and SVM.

, , , , and . RACS, page 310-315. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic Context Extraction from Wikipedia Document., , and . SWWS, page 38-41. CSREA Press, (2010)CTD: Fast, Accurate, and Interpretable Method for Static and Dynamic Tensor Decompositions., , and . CoRR, (2017)Automatic Evaluation of Document Classification Using N-Gram Statistics., , , , and . NBiS, page 739-742. IEEE Computer Society, (2012)Data Programming by Demonstration: A Framework for Interactively Learning Labeling Functions., , , and . CoRR, (2020)Least Slack Time Rate first: an Efficient Scheduling Algorithm for Pervasive Computing Environment., , and . J. Univers. Comput. Sci., 17 (6): 912-925 (2011)Sentiment Analysis for Tracking Breaking Events: A Case Study on Twitter., and . ACIIDS (2), volume 7803 of Lecture Notes in Computer Science, page 285-294. Springer, (2013)Information Retrieval Techniques to Grasp User Intention in Pervasive Computing Environment., , and . IMIS, page 186-191. IEEE Computer Society, (2011)Least Slack Time Rate First: New Scheduling Algorithm for Multi-Processor Environment., , and . CISIS, page 806-811. IEEE Computer Society, (2010)Low Ambiguity First Algorithm: A New Approach to Knowledge-Based Word Sense Disambiguation., , , , and . HCI (23), volume 9191 of Lecture Notes in Computer Science, page 565-574. Springer, (2015)Detection of unknown malicious script code using a conceptual graph and SVM., , , , and . RACS, page 310-315. ACM, (2012)