From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Malware Classification Methods Using API Sequence Characteristics., , и . ICITCS, том 120 из Lecture Notes in Electrical Engineering, стр. 613-626. Springer, (2011)Malware classification using instruction frequencies., , и . RACS, стр. 298-300. ACM, (2011)Automatic text summarization based on relevance feedback with query splitting (poster session)., , и . IRAL, стр. 201-202. ACM, (2000)Comparative Analysis of Term Distributions in a Sentence and in a Document for Sentence Retrieval., и . CICLing, том 2945 из Lecture Notes in Computer Science, стр. 484-487. Springer, (2004)An Analysis of Malware Attached in Spam., и . ICITCS, том 120 из Lecture Notes in Electrical Engineering, стр. 601-605. Springer, (2011)Malware analysis using visualized images and entropy graphs., , , и . Int. J. Inf. Sec., 14 (1): 1-14 (2015)Some Effective Techniques for Naive Bayes Text Classification, , , и . Knowledge and Data Engineering, IEEE Transactions on, 18 (11): 1457 -1466 (ноября 2006)Phrase-Based Definitional Question Answering Using Definition Terminology., , , и . AIRS, том 3689 из Lecture Notes in Computer Science, стр. 246-259. Springer, (2005)A Survey on P2P Botnet Detection., и . ICITCS, том 120 из Lecture Notes in Electrical Engineering, стр. 589-593. Springer, (2011)Malware analysis method using visualization of binary files., , и . RACS, стр. 317-321. ACM, (2013)