Author of the publication

A scalable multi-level feature extraction technique to detect malicious executables.

, , and . Inf. Syst. Frontiers, 10 (1): 33-45 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Facing the reality of data stream classification: coping with scarcity of labeled data., , , , , , and . Knowl. Inf. Syst., 33 (1): 213-244 (2011)Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing., , , , and . IEEE Trans. Knowl. Data Eng., 23 (9): 1312-1327 (2011)Android based mobile apps for information security hands-on education., , , , and . Educ. Inf. Technol., 22 (1): 125-144 (2017)Email Worm Detection Using Naïve Bayes and Support Vector Machine., , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 733-734. Springer, (2006)Recurring and Novel Class Detection Using Class-Based Ensemble for Evolving Data Stream., , , , , , , , and . IEEE Trans. Knowl. Data Eng., 28 (10): 2752-2764 (2016)FSBD: A Framework for Scheduling of Big Data Mining in Cloud Computing., , and . BigData Congress, page 514-521. IEEE Computer Society, (2014)Distributed Algorithms for Multiple Path Backbone Discovery in Thick Linear Sensor Networks., , , , and . J. Sens. Actuator Networks, 10 (3): 49 (2021)Deep learning approach to security enforcement in cloud workflow orchestration., , , , and . J. Cloud Comput., 12 (1): 10 (December 2023)An extended identity-based cryptography protocol based on biometric., and . Int. J. Inf. Priv. Secur. Integr., 2 (3): 232-256 (2016)Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams., , , , , , , and . IEEE Trans. Knowl. Data Eng., 25 (7): 1484-1497 (2013)