From post

Application Marketplace Malware Detection by User Feedback Analysis.

, , , , и . ICISSP (Revised Selected Papers), том 867 из Communications in Computer and Information Science, стр. 1-19. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deployment of DNIDS in Social Networks., , и . ISI, стр. 59-65. IEEE, (2007)Simulating Threats Propagation within the NSP Infrastructure., , , и . ISI, стр. 380. IEEE, (2007)Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback., , и . CoRR, (2020)Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic., , , и . SBP-BRiMS, том 9708 из Lecture Notes in Computer Science, стр. 239-249. Springer, (2016)Application Marketplace Malware Detection by User Feedback Analysis., , , , и . ICISSP (Revised Selected Papers), том 867 из Communications in Computer and Information Science, стр. 1-19. Springer, (2017)Predictive web automation assistant for people with vision impairments., , , и . WWW, стр. 1031-1040. International World Wide Web Conferences Steering Committee / ACM, (2013)The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case., , , и . EuroS&P Workshops, стр. 99-103. IEEE, (2017)Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media., , и . CoRR, (2017)Bandit Algorithms for Social Network Queries., , , и . SocialCom, стр. 148-153. IEEE Computer Society, (2013)Analysis of Attack Graph Representations for Ranking Vulnerability Fixes., , , , и . GCAI, том 55 из EPiC Series in Computing, стр. 215-228. EasyChair, (2018)