Cited By
View all- Upadhyay UKumar ASharma GSaini AArya VGaurav AChui K(2023)Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and TechniquesInternational Journal of Cloud Applications and Computing10.4018/IJCAC.33436414:1(1-30)Online publication date: 1-Dec-2023
- Yang YLin YLi ZZhao LYao MLai YLi P(2023)GooseBt: A programmable malware detection framework based on process, file, registry, and COM monitoringComputer Communications10.1016/j.comcom.2023.03.011204(24-32)Online publication date: Apr-2023
- Han WXue JWang YZhu SKong Z(2019)Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research SmoothlyIEEE Access10.1109/ACCESS.2019.29457877(143573-143596)Online publication date: 2019
- Show More Cited By