From post

An Integrated Architecture for IoT Malware Analysis and Detection.

, , , , , , и . IoTaaS, том 271 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 127-137. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A11 Your PLCs Belong to Me: ICS Ransomware Is Realistic., , , , , , и . TrustCom, стр. 502-509. IEEE, (2020)An Integrated Architecture for IoT Malware Analysis and Detection., , , , , , и . IoTaaS, том 271 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 127-137. Springer, (2018)Learning Social Image Embedding with Deep Multimodal Attention Networks., , , , , и . ACM Multimedia (Thematic Workshops), стр. 460-468. ACM, (2017)Visual-textual sentiment classification with bi-directional multi-level attention networks., , , , , , и . Knowl. Based Syst., (2019)基于双语主题模型和双语词向量的跨语言知识链接 (Cross-language Knowledge Linking Based on Bilingual Topic Model and Bilingual Embedding)., , , и . 计算机科学, 46 (1): 238-244 (2019)A spiral process of formalization and verification: A case study on verification of the scheduling mechanism of OSEK/VDX., , и . J. Inf. Secur. Appl., (2016)A Generic Architecture to Detect Vulnerability Leaks at Crowdsourced Tests., , , и . CNCERT, том 970 из Communications in Computer and Information Science, стр. 136-144. Springer, (2018)Coranking the Future Influence of Multiobjects in Bibliographic Network Through Mutual Reinforcement., , , , , и . ACM Trans. Intell. Syst. Technol., 7 (4): 64:1-64:28 (2016)Capsule Networks for Chinese Opinion Questions Machine Reading Comprehension., , , и . CCL, том 11856 из Lecture Notes in Computer Science, стр. 521-532. Springer, (2019)An Efficient Tool for Industrial Control System Security Analysis., , , , , , , и . DASC/PiCom/DataCom/CyberSciTech, стр. 424-427. IEEE Computer Society, (2016)