Author of the publication

Machine learning for attack vector identification in malicious source code.

, and . ISI, page 21-23. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Collection of Visual Thesauri for Browsing Large Collections of Geographic Images., , , and . JASIS, 50 (9): 826-834 (1999)Examining User Acceptance of COPLINK Technologies by Law Enforcement Officers: A Survey Study., , , and . DG.O, Digital Government Research Center, (2002)BioPortal: Sharing, Analyzing & Visualizing Infectious Disease Datasets., , , , , , , and . DG.O, Digital Government Research Center, (2004)Textual Analysis of Stock Market Prediction Using Financial News Articles., and . AMCIS, page 185. Association for Information Systems, (2006)Semantic indexing and searching using a Hopfield net., , and . J. Inf. Sci., 24 (1): 3-18 (1998)Senior Scholars' Forum., , , , , and . ICIS, Association for Information Systems, (2011)A Spatio Temporal Visualizer for Law Enforcement., , , , , , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 181-194. Springer, (2003)Homeland Security Data Mining Using Social Network Analysis.. EuroISI, volume 5376 of Lecture Notes in Computer Science, page 4. Springer, (2008)Mapping Dark Web Geolocation., and . EuroISI, volume 5376 of Lecture Notes in Computer Science, page 97-107. Springer, (2008)An integrated approach to mapping worldwide bioterrorism research capabilities., , , , and . ISI, page 212-214. IEEE, (2008)