Author of the publication

A survey of malware behavior description and analysis.

, , , , and . Frontiers Inf. Technol. Electron. Eng., 19 (5): 583-603 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The New Progress in the Research of Binary Vulnerability Analysis., , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 265-276. Springer, (2018)Simulation and Analysis of the Topographic Effects on Snow-Free Albedo over Rugged Terrain., , , , , , , and . Remote Sensing, 10 (2): 278 (2018)Effect on Generalization of Using Relational Information in List-Wise Algorithms., , , , and . ICPCA/SWS, volume 7719 of Lecture Notes in Computer Science, page 108-121. Springer, (2012)Predicting Students' Academic Procrastination in Blended Learning Course Using Homework Submission Data., , , , , , and . IEEE Access, (2019)The Electrochemical Behavior of Carbon Fiber Microelectrodes Modified with Carbon Nanotubes Using a Two-Step Electroless Plating/Chemical Vapor Deposition Process., , , , , and . Sensors, 17 (4): 725 (2017)Course Recommendation Model in Academic Social Networks Based on Association Rules and Multi -similarity., , , , , , and . CSCWD, page 277-282. IEEE, (2018)Personalized Recommendation Based on Implicit Social Network of Researchers., , , , and . ICPCA/SWS, volume 7719 of Lecture Notes in Computer Science, page 97-107. Springer, (2012)Defending against Internet worms: a signature-based approach., and . INFOCOM, page 1384-1394. IEEE, (2005)Exposing the hidden to the eyes: Analysis of SCHOLAT E-Learning data., , , , and . CSCWD, page 693-698. IEEE, (2016)An interval type-2 fuzzy model of computing with words., and . Inf. Sci., (2014)