Author of the publication

Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process.

, , , and . Secur. Commun. Networks, 9 (16): 3483-3495 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ITADP: An inter-tenant attack detection and prevention framework for multi-tenant SaaS., , and . J. Inf. Secur. Appl., (2019)Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process., , , and . Secur. Commun. Networks, 9 (16): 3483-3495 (2016)TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network., , , and . Trans. Emerg. Telecommun. Technol., (2022)ModularFed: Leveraging Modularity in Federated Learning Frameworks., , , , , and . CoRR, (2022)Combining heterogeneous anomaly detectors for improved software security., , , and . J. Syst. Softw., (2018)Multi-Tenant Intrusion Detection Framework as a Service for SaaS., , , and . IEEE Trans. Serv. Comput., 15 (5): 2925-2938 (2022)An anomaly detection system based on variable N-gram features and one-class SVM., , , and . Inf. Softw. Technol., (2017)Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability., , , and . IEEE Trans. Cloud Computing, 7 (2): 314-328 (2019)Independent and Identically Distributed (IID) Data Assessment in Federated Learning., , , , , and . GLOBECOM, page 293-298. IEEE, (2022)P-Code Based Classification to Detect Malicious VBA Macro., and . ISNCC, page 1-6. IEEE, (2020)