Author of the publication

Machine learning-based mobile threat monitoring and detection.

, , and . SERA, page 67-73. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends., and . IEEE Access, (2018)A cloud/edge computing streaming system for network traffic monitoring and threat detection., , , , and . Int. J. Secur. Networks, 13 (3): 169-186 (2018)Towards Scalability of the IoT Search Engine., , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 521-528. IEEE, (2021)Search Engine for Heterogeneous Internet of Things Systems and Optimization., , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 475-482. IEEE, (2020)Machine learning-based mobile threat monitoring and detection., , and . SERA, page 67-73. IEEE Computer Society, (2016)A streaming-based network monitoring and threat detection system., , , , and . SERA, page 31-37. IEEE Computer Society, (2016)Towards Deep Learning-Based Approach for Detecting Android Malware., , , , , and . Int. J. Softw. Innov., 7 (4): 1-24 (2019)Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities., , , , , and . IEEE Access, (2019)Tuning Deep Learning Performance for Android Malware Detection., , , , , and . SNPD, page 140-145. IEEE Computer Society, (2018)Routing in Large-scale Dynamic Networks: A Bloom Filter-based Dual-layer Scheme., , , , and . ACM Trans. Internet Techn., 20 (4): 38:1-38:24 (2020)