From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mobile Malware Detection using Op-code Frequency Histograms., , и . SECRYPT, стр. 27-38. SciTePress, (2015)Silent and Continuous Authentication in Mobile Environment., , , и . SECRYPT, стр. 97-108. SciTePress, (2016)VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware., , , и . ICISSP, стр. 517-525. SciTePress, (2018)Identifying Insecure Features in Android Applications using Model Checking., , и . ICISSP, стр. 589-596. SciTePress, (2018)Applying Deep Learning Techniques to CAN Bus Attacks for Supporting Identification and Analysis Tasks., , и . ICETE (2), стр. 479-487. SciTePress, (2018)Applying Machine Learning Techniques to Detect and Analyze Web Phishing Attacks., , и . iiWAS, стр. 355-359. ACM, (2018)Real-Time Driver Behaviour Characterization Through Rule-Based Machine Learning., , , , и . SAFECOMP Workshops, том 11094 из Lecture Notes in Computer Science, стр. 374-386. Springer, (2018)BPM perspectives to support ICSs: Exploiting the integration of formal verifications into investment service provision processes., , , и . Ind. Manag. Data Syst., 120 (7): 1383-1400 (2020)Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence., , , , и . IJCNN, стр. 1-8. IEEE, (2020)Android malware detection based on system call sequences and LSTM., , , , и . Multimedia Tools Appl., 78 (4): 3979-3999 (2019)