Author of the publication

Scholarly Digital Libraries as a Platform for Malware Distribution.

, , , , , , and . SG-CRC, volume 15 of Cryptology and Information Security Series, page 107-128. IOS Press, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hybrid approach for fault detection in autonomous physical agents., , and . AAMAS, page 941-948. IFAAMAS/ACM, (2014)An Overview of IDS Using Anomaly Detection., and . Database Technologies: Concepts, Methodologies, Tools, and Applications, IGI Global, (2009)Introduction to recommender systems handbook, , and . Springer, (2011)User Feedback Analysis for Mobile Malware Detection., , , , and . ICISSP, page 83-94. SciTePress, (2017)Data mining and knowledge discovery handbook, and . (2005)Explaining anomalies detected by autoencoders using Shapley Additive Explanations., , , and . Expert Syst. Appl., (2021)Attribute-Driven Hidden Markov Model Trees for Intention Prediction., , and . IEEE Trans. Syst. Man Cybern. Part C, 42 (6): 1103-1119 (2012)Efficient Multidimensional Suppression for K-Anonymity., , , and . IEEE Trans. Knowl. Data Eng., 22 (3): 334-347 (2010)Ensemble methods for improving the performance of neighborhood-based collaborative filtering., , , , and . RecSys, page 261-264. ACM, (2009)Leveraging metadata to recommend keywords for academic papers, , and . Journal of the Association for Information Science and Technology, 67 (12): 3073--3091 (December 2016)