Author:
Deshmukh Suchita,Troia Fabio Di,Stamp Mark
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference34 articles.
1. Annachatre, C., Austin, T.H., Stamp, M.: Hidden Markov models for malware classification. J. Comput. Virol. Hacking Tech. 11(2), 59–73 (2015)
2. Bradley, A.P.: The use of the area under the ROC curve in the evolution of machine learning algorithms. Pattern Recogn. 30, 1145–1159 (1997)
3. Cryptanalysis of Vigenère Cipher and Substitution Cipher. http://shodhganga.inflibnet.ac.in/bitstream/10603/26543/10/10_chapter5.pdf
4. Deshmukh, S.: Vigenère Cipher for Malware Detection, Master’s Report, Department of Computer Science, San Jose State University (2016)
5. F-Secure Annual Security Report 2007. https://www.f-secure.com/documents/10192/1118990/AnnualReport_2007_en.pdf/
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Intelligent Power Measurement System;Innovative Computing Vol 1 - Emerging Topics in Artificial Intelligence;2023
2. Detection of Load Loss of Large Capacity Transformer;Innovative Computing Vol 1 - Emerging Topics in Artificial Intelligence;2023
3. Data Transmission and Isolation Method for Power Bus Communication;Innovative Computing Vol 1 - Emerging Topics in Artificial Intelligence;2023
4. Method for Locating Communication Device Faults;Innovative Computing Vol 1 - Emerging Topics in Artificial Intelligence;2023