Author:
Katiyar Aditi,Aktar Neha,Mayank ,Lavanya K.
Reference8 articles.
1. Landage, J., Wankhade, M.P.: Malware and malware detection techniques: a survey. Int. J. Eng. Res. Technol. (IJERT) 2(12) (2013). ISSN: 2278-0181
2. Idika, N., Mathur, A.P.: A Survey of Malware Detection Techniques, p. 48. Purdue University (2007)
3. Tahir, R.: A study on malware and malware detection techniques. Int. J. Educ. Manage. Eng. 8(2), 20 (2018)
4. Sun, J., Lou, Y., Ye, F: Research on anomaly pattern detection in hydrological time series. In: Web Information Systems and Applications Conference (WISA) IEEE Conferences (2017)
5. Zang, D., Liu, J., Wang, H.: Markov chain-based feature extraction for anomaly detection in time series and its industrial application. In: Chinese Control and Decision Conference (CCDC) (2018)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Information visualization in big data and IoT : A review;MACHINE LEARNING AND INFORMATION PROCESSING: PROCEEDINGS OF ICMLIP 2023;2023