Author of the publication

Efficient Android Malware Detection Using API Rank and Machine Learning.

, , , , and . J. Internet Serv. Inf. Secur., 9 (1): 48-59 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing and Detecting Skype-Relayed Traffic., , , and . INFOCOM, IEEE, (2006)Passive online wireless LAN health monitoring from a single measurement point., , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 14 (4): 19-21 (2010)LinkForecast: Cellular Link Bandwidth Prediction in LTE Networks., , , , , and . IEEE Trans. Mob. Comput., 17 (7): 1582-1594 (2018)Session lengths and IP address usage of smartphones in a university campus WiFi network: Characterization and analytical models., , , , and . IPCCC, page 1-9. IEEE Computer Society, (2013)Android Malware Detection Based on Useful API Calls and Machine Learning., , , , , , and . AIKE, page 175-178. IEEE Computer Society, (2018)Enhancing Sustainability in Machine Learning-based Android Malware Detection using API calls., , , , and . AIKE, page 131-134. IEEE, (2022)Efficient Android Malware Detection Using API Rank and Machine Learning., , , , and . J. Internet Serv. Inf. Secur., 9 (1): 48-59 (2019)Securely outsourcing cookies to the cloud via private information retrieval., , , , , , and . WiMob, page 1-8. IEEE Computer Society, (2016)P2Cast: peer-to-peer patching scheme for VoD service., , , and . WWW, page 301-309. ACM, (2003)Exploiting the IPID Field to Infer Network Path and End-System Characteristics., , , , , , , and . PAM, volume 3431 of Lecture Notes in Computer Science, page 108-120. Springer, (2005)