Your selections:
- O'Neill, Mark, Hallam-Baker, Phillip, Mac Cann, Sean, Shema, Mike, Simon, Ed, Watters, Paul, White, Andrew
Rapid identification of rootkit infections using data mining
Electronic submission of reports for suspected adverse reactions to drugs and vaccines
- Darby, Jane, Lynton-Moll, Chris, Boyd, Ian
Identifying rootkit infections using data mining
- Lobo, Desmond, Watters, Paul, Wu, Xinwen
Forensic identification and detection of hidden and obfuscated malware
Program behaviour modelling with flexible logical entity abstraction
Exploiting social influence for context-aware event recommendation in event-based social networks
- Zhibo, Wang, Yongquan, Zhang, Yijie, Li, Qian, Wang, Xia, Feng
Windows rootkits: Attacks and countermeasures
- Lobo, Desmond, Watters, Paul, Wu, Xin, Sun, Li
A survey on representation learning efforts in cybersecurity domain
- Usman, Muhammad, Jan, Mian, He, Xiangjian, Chen, Jinjun
SAMS: A seamless and authorized multimedia streaming framework for wmsn-based iomt
- Jan, Mian, Usman, Muhammad, He, Xiangjian, Ur Rehman, Ateeq
- Han, Tao, Jan, Syed, Tan, Zhiyuan, Usman, Muhammad, Jan, Mian, Khan, Rahim, Xu, Yongzhao
Are you sure you would like to clear your session, including search history and login status?