Author of the publication

Using artificial neural networks to detect unknown computer worms.

, , , , and . Neural Comput. Appl., 18 (7): 663-674 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavioral Study of Users When Interacting with Active Honeytokens., , , , , and . ACM Trans. Inf. Syst. Secur., 18 (3): 9:1-9:21 (2016)CoBAn: A context based model for data leakage prevention., , and . Inf. Sci., (2014)Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings., , , , , and . IEEE Access, (2022)Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework., , , , , , and . IEEE Access, (2019)CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices., , , , , , , and . IEEE Access, (2020)A dual-layer context-based architecture for the detection of anomalous instructions sent to medical devices., , , and . Artif. Intell. Medicine, (2022)Anomaly detection for smartphone data streams., , , , and . Pervasive Mob. Comput., (2017)A decision-theoretic approach to data mining., and . IEEE Trans. Syst. Man Cybern. Part A, 33 (1): 42-51 (2003)User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study., , and . IEEE Trans. Inf. Forensics Secur., (2020)Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations., , , and . CoRR, (2020)