Author:
Lee Wonjun,Nadim Mohammad
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Leveraging machine learning techniques for the identification of Trojans in container images;AIP Conference Proceedings;2024
2. Identifying Vulnerabilities in Docker Image Code using ML Techniques;2022 2nd Asian Conference on Innovation in Technology (ASIANCON);2022-08-26
3. Analysis of Identity Access Management Controls in IoT Systems;2022 IEEE 7th International conference for Convergence in Technology (I2CT);2022-04-07
4. A Review on Learning-based Detection Approaches of the Kernel-level Rootkit;2021 International Conference on Engineering and Emerging Technologies (ICEET);2021-10-27