Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study on the performances of dynamic classifier selection based on local accuracy estimation., , , and . Pattern Recognit., 38 (11): 2188-2191 (2005)IntelliAV: Building an Effective On-Device Android Malware Detector., , and . CoRR, (2018)DLLMiner: structural mining for malware detection., , , , and . Secur. Commun. Networks, 8 (18): 3311-3322 (2015)Reject option with multiple thresholds., , and . Pattern Recognit., 33 (12): 2099-2101 (2000)An approach to the automatic design of multiple classifier systems., and . Pattern Recognit. Lett., 22 (1): 25-33 (2001)Application of neural networks and statistical pattern recognition algorithms to earthquake risk evaluation., , and . Pattern Recognit. Lett., 18 (11-13): 1353-1362 (1997)Fusion of multiple classifiers for intrusion detection in computer networks., , and . Pattern Recognit. Lett., 24 (12): 1795-1803 (2003)Special Issue ÄI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection"., and . Algorithms, 16 (7): 327 (July 2023)Information fusion in computer security., , and . Inf. Fusion, 10 (4): 272-273 (2009)Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis., , and . IEEE Trans. Dependable Secur. Comput., 9 (5): 714-726 (2012)