Author of the publication

Multilevel functional quantification of movements for EDR in the cloud/on-premises systems.

, , , and . ENC, page 1-7. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image compressive sensing cryptographic analysis., , , and . CONIELECOMP, page 81-86. IEEE, (2016)Multilevel functional quantification of movements for EDR in the cloud/on-premises systems., , , and . ENC, page 1-7. IEEE, (2023)Botnet Detection using Clustering Algorithms., , and . Res. Comput. Sci., (2016)Identification of Static and Dynamic Security Controls Using Machine Learning., , , and . Computación y Sistemas (CyS), (2023)Security controls for Android., , , and . CASoN, page 212-216. IEEE, (2012)Feature selection to detect botnets using machine learning algorithms., , and . CONIELECOMP, page 1-7. IEEE, (2017)Towards a 2-hybrid Android malware detection test framework., , , , and . CONIELECOMP, page 54-61. IEEE, (2016)Possible Keyloggers Without Implementing a Keyboard in Android., , , and . ATCS/SePrIoT@SecureComm, volume 239 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 104-112. Springer, (2017)Reverse engineering with bioinformatics algorithms over a sound android covert channel., , and . MALWARE, page 3-9. IEEE Computer Society, (2016)