Author of the publication

Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense.

, , , and . Comput. Secur., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Token-Based Solution to the Group Mutual l-Exclusion Problem in Message Passing Distributed Systems., and . ICDCN, volume 5935 of Lecture Notes in Computer Science, page 178-183. Springer, (2010)Hash-based Byzantine fault tolerant agreement with enhanced view consistency., and . Int. J. Commun. Networks Distributed Syst., 12 (2): 152-168 (2014)Message efficient global snapshot recording using a self stabilizing spanning tree in a MANET., and . Int. J. Commun. Networks Inf. Secur., (2011)A Leader-Based k-Local Mutual Exclusion Algorithm Using Token for MANETs., , and . J. Inf. Sci. Eng., 30 (5): 1303-1319 (2014)A review of Deep Learning based methods for Affect Analysis using Physiological Signals., , and . Multim. Tools Appl., 82 (17): 26089-26134 (July 2023)Verifying Mutual Exclusion and Liveness Properties with Split Preconditions., and . J. Comput. Sci. Technol., 19 (6): 795-802 (2004)Blockchain based audit trailing of XAI decisions: Storing on IPFS and Ethereum Blockchain., , , and . COMSNETS, page 1-5. IEEE, (2021)Elite Leader Finding Algorithm for MANETs., and . ISPDC, page 125-132. IEEE Computer Society, (2011)Multi-objective workflow grid scheduling using ε-fuzzy dominance sort based discrete particle swarm optimization., and . J. Supercomput., 68 (2): 709-732 (2014)An Index-Based Mobile Checkpointing and Recovery Algorithm., , and . ICDCN, volume 5408 of Lecture Notes in Computer Science, page 200-205. Springer, (2009)