Search for persons
X
?
2020 10th International Symposium onTelecommunications (IST) ,
1
Security Framework of IoT-Based Smart Home:
, In:
?
2020 17th International ISC Conference on Information Security and Cryptology (ISCISC) ,
2
A Deep Learning-based Malware Hunting Technique to Handle I..:
, In:
?
2020 25th International Computer Conference, Computer Society of Iran (CSICC) ,
3
FKNDT: A Flexible Kernel by Negotiating Between Data-depend..:
, In:
?
Handbook of Big Data Privacy ,
4
Active Spectral Botnet Detection Based on Eigenvalue Weight..:
, In:
?
2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) ,
5
Investigating the Streaming Algorithms Usage in Website Fin..:
, In:
?
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE) ,
6
Discovering Future Malware Variants By Generating New Malwa..:
, In:
?
2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) ,
7
Hybrid Intrusion Detection: Combining Decision Tree and Gau..:
, In:
?
2015 4th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS) ,
8
Proposing an HMM-based approach to detect metamorphic malwa..:
, In:
?
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication ,
9
A levelwise spectral co-clustering algorithm for collaborat..:
, In:
?
Proceedings of the 13th annual conference companion on Genetic and evolutionary computation ,
10
Voting based learning classifier system for multi-label cla..:
, In:
?
Proceedings of the 13th annual conference on Genetic and evolutionary computation ,
11
Towards final rule set reduction in XCS : a fuzzy repres..:
, In:
?
Proceedings of the 2010 ACM Symposium on Applied Computing ,
12
Malware detection based on mining API calls:
, In:
?