Author of the publication

Relationship of Jaccard and edit distance in malware clustering and online identification (Extended abstract).

, , , , and . NCA, page 369-373. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps., , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 796-804. Springer, (2018)Behavior profiling for robust anomaly detection., , , and . WCNIS, page 465-471. IEEE, (2010)A virtual data queue access scheme for integrated LANs., and . ICCC, page 558-562. International Council for Computer Communication / Elsevier, (1988)HiMIP-NEMO: Combining Cross-Layer Network Mobility Management and Resource Allocation for Fast QoS-Handovers., , and . VTC Spring, page 2282-2286. IEEE, (2008)A Two-Stage Link Scheduling Scheme for Variable-Bit-Rate Traffic Flows in Wireless Mesh Networks., , and . IEEE Trans. Wirel. Commun., 13 (11): 6232-6244 (2014)Characterizing the Influence of Features on Reading Difficulty Estimation for Non-native Readers., , and . CoRR, (2018)PVA: A Self-Adaptive Personal View Agent., , and . J. Intell. Inf. Syst., 18 (2-3): 173-194 (2002)Distributed Agent-based IP Location System Framework Design., , and . Int. J. Online Biomed. Eng., 9 (S7): 4-11 (2013)Open Source Intelligence for Malicious Behavior Discovery and Interpretation., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 776-789 (2022)A novel approach to evaluate software vulnerability prioritization., , , and . J. Syst. Softw., 86 (11): 2822-2840 (2013)