Author of the publication

On periodic behavior of malware: experiments, opportunities and challenges.

, , and . MALWARE, page 85-92. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web data extraction based on structural similarity, , and . Knowledge and Information Systems, 8 (4): 438--461 (February 2005)Web Data Management: A Warehouse Approach, , and . Springer, (2004)Transitive Pseudonyms Mediated EHRs Sharing for Very Important Patients., and . ICWS, volume 11512 of Lecture Notes in Computer Science, page 80-94. Springer, (2019)Rapid Association Rule Mining., , and . CIKM, page 474-481. ACM, (2001)Visual Terrain Analysis of High-Dimensional Datasets., , and . PKDD, volume 3721 of Lecture Notes in Computer Science, page 593-600. Springer, (2005)Model and Research Issues for Refreshing a Very Large Website., , and . WISE, page 291-295. IEEE Computer Society, (2000)On the Feasibility of Website Refresh Queries., , and . DEXA, volume 1677 of Lecture Notes in Computer Science, page 1076-1085. Springer, (1999)Incremental and Adaptive Clustering Stream Data over Sliding Window., , , and . DEXA, volume 5690 of Lecture Notes in Computer Science, page 660-674. Springer, (2009)Communication-Efficient Classification in P2P Networks., , , and . ECML/PKDD (1), volume 5781 of Lecture Notes in Computer Science, page 83-98. Springer, (2009)Secure reachability query on private shared graphs., and . ISSNIP, page 1-6. IEEE, (2014)