Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Chronological Evaluation of Unknown Malcode Detection., , and . PAISI, volume 5477 of Lecture Notes in Computer Science, page 112-117. Springer, (2009)User identity verification via mouse dynamics., , , , and . Inf. Sci., (2012)Unknown malcode detection and the imbalance problem., , , , , and . J. Comput. Virol., 5 (4): 295-308 (2009)A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems., , , , , , and . HASE, page 153-156. IEEE Computer Society, (2017)Unknown malcode detection - A chronological evaluation., , and . ISI, page 267-268. IEEE, (2008)Unknown malcode detection via text categorization and the imbalance problem., , , , and . ISI, page 156-161. IEEE, (2008)Detecting unknown malicious code by applying classification techniques on OpCode patterns., , , , and . Secur. Informatics, 1 (1): 1 (2012)Improving the Detection of Unknown Computer Worms Activity Using Active Learning., , , , , and . KI, volume 4667 of Lecture Notes in Computer Science, page 489-493. Springer, (2007)Unknown Malcode Detection Using OPCODE Representation., , , , , , and . EuroISI, volume 5376 of Lecture Notes in Computer Science, page 204-215. Springer, (2008)Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining., , , , , , , and . CIDM, page 202-209. IEEE, (2007)