Author of the publication

Detecting malicious behaviour using supervised learning algorithms of the function calls.

, and . Int. J. Electron. Secur. Digit. Forensics, 5 (2): 90-109 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Integrating Big Data Security Into Agricultural Supply Chain., , , , , , and . BigDataService, page 191-194. IEEE, (2019)Detecting malicious behaviour using supervised learning algorithms of the function calls., and . Int. J. Electron. Secur. Digit. Forensics, 5 (2): 90-109 (2013)Missing Data Imputation for Individualised CVD Diagnostic and Treatment., , , and . CinC, www.cinc.org, (2016)Towards Smart Online Dispute Resolution for Medical Disputes., , and . ACSW, page 40:1-40:5. ACM, (2020)Data analytics identify glycated haemoglobin co-markers for type 2 diabetes mellitus diagnosis., , , and . Comput. Biol. Medicine, (2016)Robust Intelligent Malware Detection Using Deep Learning., , , , and . IEEE Access, (2019)Smart Home Automation - Use Cases of a Secure and Integrated Voice-Control System., , and . Syst., 9 (4): 77 (2021)MapReduce neural network framework for efficient content based image retrieval from large datasets in the cloud., and . HIS, page 63-68. IEEE, (2012)Big Data Infrastructure, Data Visualisation and Challenges., and . BDIOT, page 13-17. ACM, (2019)A Hybrid Wrapper-Filter Approach for Malware Detection., , , , , , and . J. Networks, 9 (11): 2878-2891 (2014)