Author of the publication

Experimental Comparison of Machine Learning Models in Malware Packing Detection.

, , , and . APNOMS, page 377-380. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly detection for big log data using a Hadoop ecosystem., , and . BigComp, page 377-380. IEEE, (2017)Linear Detrending Subsequence Matching in Time-Series Databases, , and . CoRR, (2010)Assessing the trustworthiness of location data based on provenance., , , and . GIS, page 276-285. ACM, (2009)Provenance-based trustworthiness assessment in sensor networks., , and . DMSN, page 2-7. ACM, (2010)An Efficient Algorithm for Computing Range-Groupby Queries., , , , and . DASFAA, volume 3882 of Lecture Notes in Computer Science, page 483-497. Springer, (2006)Performance Analysis of Hadoop-Based SQL and NoSQL for Processing Log Data., , , and . DASFAA Workshops, volume 9052 of Lecture Notes in Computer Science, page 293-299. Springer, (2015)Envelope-based boundary image matching for smart devices under arbitrary rotations., , , and . Multim. Syst., 21 (1): 29-47 (2015)Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection., , , , , and . Secur. Commun. Networks, (2017)Experimental Comparison of Machine Learning Models in Malware Packing Detection., , , and . APNOMS, page 377-380. IEEE, (2020)Measurement Noise Recommendation for Efficient Kalman Filtering over a Large Amount of Sensor Data., , , and . Sensors, 19 (5): 1168 (2019)