Author of the publication

Discovering Malicious URLs Using Machine Learning Techniques.

, , , and . Data Science in Cybersecurity and Cyberthreat Intelligence, volume 177 of Intelligent Systems Reference Library, Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tailored Security: Building Nonrepudiable Security Service-Level Agreements., , , , and . CoRR, (2014)Ontological Approach toward Cybersecurity in Cloud Computing., , and . CoRR, (2014)ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family., , , , , and . PRDC, page 257-262. IEEE, (2018)The Usability of Metadata for Android Application Analysis., , , , , and . ICONIP (1), volume 9947 of Lecture Notes in Computer Science, page 546-554. (2016)Intrinsically Motivated Self-Supervised Deep Sensorimotor Learning for Grasping., , and . IROS, page 3496-3502. IEEE, (2018)Development of Line Post Type Polymer Insulation Arm for 154 kV, , , and . (2000)Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation., , , and . J. Inf. Secur. Appl., (2017)Multicast source handover scheme based on proxy router discovery., , and . BROADNETS, page 865-874. IEEE, (2005)Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation., , , , and . IEEE Trans. Emerg. Top. Comput., 4 (1): 88-101 (2016)A new approach to built-in self-testable datapath synthesis based on integer linear programming., , , and . IEEE Trans. Very Large Scale Integr. Syst., 8 (5): 594-605 (2000)