Author of the publication

Virtual structures and heterogeneous nodes in dependency graphs for detecting metamorphic malware.

, , and . IPCCC, page 1-8. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparison study between the TLS-based security framework and IKEv2 when protecting DSMIPv6 signaling., , and . Comput. Stand. Interfaces, 36 (3): 489-500 (2014)An Online Method for Supporting and Monitoring Repetitive Physical Activities Based on Restricted Boltzmann Machines., , , and . J. Sens. Actuator Networks, 12 (5): 70 (September 2023)A Smartphone Lightweight Method for Human Activity Recognition Based on Information Theory., , , and . Sensors, 20 (7): 1856 (2020)A Comparative Analysis of the Impact of Features on Human Activity Recognition with Smartphone Sensors., , , , , and . WebMedia, page 397-404. ACM, (2017)RIP - A robust IP access architecture., , , , and . Comput. Secur., 28 (6): 359-380 (2009)How Validation Methodology Influences Human Activity Recognition Mobile Systems., , , and . Sensors, 22 (6): 2360 (2022)Analysis of generalizability on predicting COVID-19 from chest X-ray images using pre-trained deep models., , , , , , and . Comput. methods Biomech. Biomed. Eng. Imaging Vis., 11 (7): 2725-2735 (January 2024)Techniques to detect data leakage in mobile applications., , and . Int. J. Secur. Networks, 14 (3): 146-157 (2019)DARE: A decentralized association rules extraction scheme for embedded data sets in distributed IoT devices., , , , and . Int. J. Distributed Sens. Networks, 16 (10): 155014772096299 (2020)A message-oriented middleware for sensor networks., , , , , and . Middleware for Pervasive and Ad-hoc Computing, page 127-134. ACM, (2004)