Cited By
View all- Thabit HAhmad RAbdullah AAbualkishik AAlwan A(2025)Detecting Malicious .NET Executables Using Extracted Methods NamesAI10.3390/ai60200206:2(20)Online publication date: 21-Jan-2025
- Peng WCui LCai WWang WCui XHao ZYun X(2025)Bottom Aggregating, Top Separating: An Aggregator and Separator Network for Encrypted Traffic UnderstandingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2025.352931620(1794-1806)Online publication date: 2025
- Koppanati RPeddoju S(2025)MSG: Missing-sequence generator for metamorphic malware detectionJournal of Information Security and Applications10.1016/j.jisa.2024.10396289(103962)Online publication date: Mar-2025
- Show More Cited By