Your selections:
- Fong, George, Corbett, Jennifer, Thompson, Helen, Feely, Paul, Fong, Barbara, Turville, Kylie, Taylor, Meghan
Malware detection and prevention system based on multi-stage rules
- Alazab, Ammar, Hobbs, Michael, Abawajy, Jemal, Khraisat, Ansam
- Kamal, Joarder, Murshed, Manzur, Buyya, Rajkumar
Hybrids of support vector machine wrapper and filter based framework for malware detection
- Huda, Shamsul, Abawajy, Jemal, Alazab, Mamoun, Abdollahian, Mali, Islam, Rafiqul, Yearwood, John
An efficient data delivery mechanism for AUV-based Ad hoc UASNs
- Karmakar, Gour, Kamruzzaman, Joarder, Nowsheen, Nusrat
Matching algorithms : fundamentals, applications and challenges
- Ren, Jing, Xia, Feng, Chen, Xiangtai, Liu, Jiaying, Sultanova, Nargiz
Random walks : a review of algorithms and applications
- Xia, Feng, Liu, Jiaying, Nie, Hansong, Fu, Yonghao, Wan, Liangtian, Kong, Xiangjie
An AI-enabled lightweight data fusion and load optimization approach for internet of things
- Jan, Mian, Zakarya, Muhammad, Khan, Muhammad, Mastorakis, Spyridon, Balasubramanian, Venki
Great South Coast ICT survey, 2011
- Thompson, Helen, Fong, George
Hybrids of support vector machine wrapper and filter based framework for malware detection
- Huda, Shamsul, Abawajy, Jemal, Alazab, Mamoun, Abdollalihiand, Mali, Islam, Rafiqul, Yearwood, John
Modelling majority and expert influences on opinion formation in online social networks
- Das, Rajkumar, Kamruzzaman, Joarder, Karmakar, Gour
Are you sure you would like to clear your session, including search history and login status?