Author:
Youssif Aliaa A. A.,Ghalwash Atef Z.,Amer Eslam A.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Identification of Malware Mimicry Attacks Using Process Escalating Visualization;2023 Intelligent Methods, Systems, and Applications (IMSA);2023-07-15
2. Healbot: NLP-based Health Care Assistant for Global Pandemics;2022 International Research Conference on Smart Computing and Systems Engineering (SCSE);2022-09-01
3. A Proposed Ensemble Voting Model for Fake News Detection;2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC);2022-05-08
4. DeepCorrect: Building an Efficient Framework for Auto Correction for Subjective Questions Using GRU_LSTM Deep Learning;2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC);2022-05-08
5. Malware Detection Approach Based on the Swarm-Based Behavioural Analysis over API Calling Sequence;2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC);2022-05-08