Author of the publication

Integrated Feature Extraction Approach Towards Detection of Polymorphic Malware In Executable Files

, , , and . International Journal of Computer Science and Security (IJCSS), 11 (2): 25-33 (April 2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structural Feature Engineering Approach for Detecting Polymorphic Malware., , , and . DASC/PiCom/DataCom/CyberSciTech, page 716-721. IEEE Computer Society, (2017)Minimal Idle-Listen Centralized Scheduling in TSCH Wireless Sensor Networks., , , , and . TSP, page 1-5. IEEE, (2018)Electricity Theft in Kampala and Potential ICT Solutions., , , and . AFRICOMM, volume 147 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 198-206. Springer, (2014)Towards a Persuasive Technology for Electricity Theft Reduction in Uganda., , and . AFRICOMM, volume 250 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 121-130. Springer, (2017)Integrated Feature Extraction Approach Towards Detection of Polymorphic Malware In Executable Files, , , and . International Journal of Computer Science and Security (IJCSS), 11 (2): 25-33 (April 2017)Field Testing a Drug Management Application at Ugandan Health Facilities., , , , and . AFRICOMM, volume 147 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 127-133. Springer, (2014)Improvement of Malware Classification Using Hybrid Feature Engineering., , , , and . SN Comput. Sci., 1 (1): 17:1-17:14 (2020)Big data: deep learning for detecting malware., , and . SEiA, page 20-26. ACM, (2018)IPv4 to IPv6 Transition Strategies for Enterprise Networks in Developing Countries., and . AFRICOMM, volume 119 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 94-104. Springer, (2012)Analysis of Mobile Phone e-Waste Management for Developing Countries: A Case of Uganda., , , and . AFRICOMM, volume 119 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 174-183. Springer, (2012)