Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reverse Engineering: EDOWA Worm Analysis and Classification., , , , and . World Congress on Engineering (Selected Papers), volume 39 of Lecture Notes in Electrical Engineering, page 277-288. Springer, (2008)Detection of Social Media Exploitation via SMS and Camera., , , and . Int. J. Interact. Mob. Technol., 13 (4): 61-79 (2019)A new mobile botnet classification based on permission and API calls., , and . EST, page 122-127. IEEE, (2017)STAKCERT Framework in Eradicating Worms Attack., , and . CW, page 257-264. IEEE Computer Society, (2009)State of the Art Intrusion Detection System for Cloud Computing., , , , , and . Int. J. Commun. Networks Inf. Secur., (2018)Android Ransomware Detection Based on Dynamic Obtained Features., , , , and . SCDM, volume 978 of Advances in Intelligent Systems and Computing, page 121-129. Springer, (2020)A Recent Assessment for the Ransomware Attacks Against the Internet of Medical Things (IoMT): A Review., , and . ICCSCE, page 238-242. IEEE, (2023)A New Mobile Malware Classification for SMS Exploitation., , and . SCDM, volume 549 of Advances in Intelligent Systems and Computing, page 456-464. Springer, (2016)A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing., , , and . UKSim, page 201-205. IEEE, (2015)An Efficient Control of Virus Propagation., and . PACIS, page 31. AISeL, (2006)