Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)., , , , , and . J. Intell. Fuzzy Syst., 44 (4): 5601-5615 (2023)Exploring halal tourism tweets on social media., , , , and . J. Big Data, 8 (1): 72 (2021)MapReduce scheduling algorithms: a review., , , , , , , , , and 1 other author(s). J. Supercomput., 76 (7): 4915-4945 (2020)Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management., , , , , and . J. Medical Syst., 42 (6): 112:1-112:23 (2018)The rise of "blockchain": bibliometric analysis of blockchain study., , , , , and . Scientometrics, 120 (3): 1289-1331 (2019)Blending Big Data Analytics: Review on Challenges and a Recent Study., , , , , , and . IEEE Access, (2020)A Bayesian probability model for Android malware detection., , , , and . ICT Express, 8 (3): 424-431 (2022)Towards a systematic description of the field using bibliometric analysis: malware evolution., , , , , and . Scientometrics, 126 (3): 2013-2055 (2021)Machine Learning Technique for Phishing Website Detection., , , , and . ICSECS, page 235-239. IEEE, (2023)Deep Learning Based Hybrid Analysis of Malware Detection and Classification: A Recent Review., , and . J. Cyber Secur. Mobil., 13 (1): 91-134 (2024)