From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A new mobile botnet classification based on permission and API calls., , и . EST, стр. 122-127. IEEE, (2017)STAKCERT Framework in Eradicating Worms Attack., , и . CW, стр. 257-264. IEEE Computer Society, (2009)A Recent Assessment for the Ransomware Attacks Against the Internet of Medical Things (IoMT): A Review., , и . ICCSCE, стр. 238-242. IEEE, (2023)Android Ransomware Detection Based on Dynamic Obtained Features., , , , и . SCDM, том 978 из Advances in Intelligent Systems and Computing, стр. 121-129. Springer, (2020)Reverse Engineering: EDOWA Worm Analysis and Classification., , , , и . World Congress on Engineering (Selected Papers), том 39 из Lecture Notes in Electrical Engineering, стр. 277-288. Springer, (2008)A New Mobile Malware Classification for SMS Exploitation., , и . SCDM, том 549 из Advances in Intelligent Systems and Computing, стр. 456-464. Springer, (2016)A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing., , , и . UKSim, стр. 201-205. IEEE, (2015)An Efficient Control of Virus Propagation., и . PACIS, стр. 31. AISeL, (2006)Crytojacking Classification based on Machine Learning Algorithm., , , , и . ICCBN, стр. 73-76. ACM, (2020)Phishing Detection and Prevention using Chrome Extension., , , , и . ISDFS, стр. 1-6. IEEE, (2022)