Author:
Huda Shamsul,Miah Suruz,Yearwood John,Alyahya Sultan,Al-Dossari Hmood,Doss Robin
Funder
Deanship of Scientific Research at king Saud University
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference37 articles.
1. Statistical method of change detection;Basseville,2002
2. K. Blokhin, J. Saxe, D. Mentis, Malware similarity identification using call graph based system call subsequence features, in: IEEE 33rd International Conference on Distributed Computing Systems Workshops, ICDCSW, 2013, pp. 6–10.
3. Deterministic detection of cloning attacks for anonymous RFID systems;Bu;IEEE Trans. Ind. Inf.,2015
4. Malwise: An effective and efficient classification system for packed and polymorphic nlalware;Cesare;IEEE Trans. Comput.,2013
5. Smote: Synthetic minority over-sampling technique;Chawla;J. Artificial Intelligence Res.,2002
Cited by
44 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献