Your selections:
Identifying rootkit infections using data mining
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
Program behaviour modelling with flexible logical entity abstraction
Rapid identification of rootkit infections using data mining
- O'Neill, Mark, Hallam-Baker, Phillip, Mac Cann, Sean, Shema, Mike, Simon, Ed, Watters, Paul, White, Andrew
Windows rootkits: Attacks and countermeasures
- Lobo, Desmond, Watters, Paul, Wu, Xin, Sun, Li
Forensic identification and detection of hidden and obfuscated malware
Electronic submission of reports for suspected adverse reactions to drugs and vaccines
- Darby, Jane, Lynton-Moll, Chris, Boyd, Ian
- Han, Tao, Jan, Syed Rooh Ullah, Tan, Zhiyuan, Usman, Muhammad, Jan, Mian Ahmad, Khan, Rahim, Xu, Yongzhao
SAMS: A seamless and authorized multimedia streaming framework for wmsn-based iomt
- Jan, Mian Ahmad, Usman, Muhammad, He, Xiangjian, Ur Rehman, Ateeq
A survey on representation learning efforts in cybersecurity domain
- Usman, Muhammad, Jan, Mian, He, Xiangjian, Chen, Jinjun
Exploiting social influence for context-aware event recommendation in event-based social networks
- Zhibo, Wang, Yongquan, Zhang, Yijie, Li, Qian, Wang, Xia, Feng
Are you sure you would like to clear your session, including search history and login status?