Detection of unknown computer worms based on behavioral classification of the host
Computational Statistics & Data Analysis
Improving malware detection by applying multi-inducer ensemble
Computational Statistics & Data Analysis
Information Security Tech. Report
Efficient Multidimensional Suppression for K-Anonymity
IEEE Transactions on Knowledge and Data Engineering
Privacy-preserving data mining: A feature set partitioning approach
Information Sciences: an International Journal
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
Journal of Systems and Software
"Andromaly": a behavioral malware detection framework for android devices
Journal of Intelligent Information Systems
F-Sign: Automatic, Function-Based Signature Generation for Malware
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Information Sciences: an International Journal
Information Sciences: an International Journal
Opcode sequences as representation of executables for data-mining-based unknown malware detection
Information Sciences: an International Journal
Toward a more practical unsupervised anomaly detection system
Information Sciences: an International Journal
Privacy-preserving disjunctive normal form operations on distributed sets
Information Sciences: an International Journal
A unified data mining solution for authorship analysis in anonymous textual communications
Information Sciences: an International Journal
Information Sciences: an International Journal
Privacy-preserving trajectory data publishing by local suppression
Information Sciences: an International Journal
Hi-index | 0.07 |