Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics., , , and . Multim. Tools Appl., 77 (14): 17519-17555 (2018)Android mobile malware detection using fuzzy AHP., , , , , and . J. Inf. Secur. Appl., (2021)Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario., , , , and . IEEE Access, (2018)The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches., , , , and . J. Netw. Comput. Appl., (2021)CAGDEEP: Mobile Malware Analysis Using Force Atlas 2 with Strong Gravity Call Graph And Deep Learning., , , and . ICSECS, page 396-401. IEEE, (2023)Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)., , , , , and . J. Intell. Fuzzy Syst., 44 (4): 5601-5615 (2023)Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management., , , , , and . J. Medical Syst., 42 (6): 112:1-112:23 (2018)The rise of "blockchain": bibliometric analysis of blockchain study., , , , , and . Scientometrics, 120 (3): 1289-1331 (2019)Towards a systematic description of the field using bibliometric analysis: malware evolution., , , , , and . Scientometrics, 126 (3): 2013-2055 (2021)A Bayesian probability model for Android malware detection., , , , and . ICT Express, 8 (3): 424-431 (2022)