Cited By
View all- Melaragno ACasey W(2022)Change Point Detection with Machine Learning for Rapid Ransomware Detection2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927828(1-9)Online publication date: 12-Sep-2022
- Alaeiyan MParsa S(2022)A hierarchical layer of atomic behavior for malicious behaviors predictionJournal of Computer Virology and Hacking Techniques10.1007/s11416-022-00422-518:4(367-382)Online publication date: 7-Apr-2022
- ManiArasuSekar KSwaminathan PMurali RK RV S(2020)Optimal Feature Selection for Non-Network Malware Classification2020 International Conference on Inventive Computation Technologies (ICICT)10.1109/ICICT48043.2020.9112437(82-87)Online publication date: Feb-2020
- Show More Cited By