Nauman, Mohammad
287  Ergebnisse:
Personensuche X
?
1

Interpretable Detection of Malicious Behavior in Windows Po..:

Khan, Sohail ; Nauman, Mohammad
Big Data Mining and Analytics.  7 (2024)  2 - p. 485-499 , 2024
 
?
2

Tractable Executable Binary Provenance Signalling through V..:

, In: 2024 21st Learning and Technology Conference (L&T),
Nauman, Mohammad - p. 41-46 , 2024
 
?
3

A privacy enhancing model for Internet of Things using thre..:

Ali, Waqas ; Nauman, Mohammad ; Azam, Nouman
Computers and Electrical Engineering.  100 (2022)  - p. 107894 , 2022
 
?
8

Op2Vec: An Opcode Embedding Technique and Dataset Design fo..:

Khan, Kaleem Nawaz ; Ullah, Najeeb ; Ali, Sikandar...
Security and Communication Networks.  2022 (2022)  - p. 1-15 , 2022
 
?
11

Function Identification in Android Binaries with Deep Learn..:

, In: 2019 Seventh International Symposium on Computing and Networking (CANDAR),
Sharif, Aizaz ; Nauman, Mohammad - p. 92-101 , 2019
 
1-15