Author of the publication

Detection of unknown malicious script code using a conceptual graph and SVM.

, , , , and . RACS, page 310-315. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XML-based retrieval of object-oriented frameworks., , , and . SMC, page 2953-2958. IEEE, (2000)A real-time smart fruit quality grading system classifying by external appearance and internal flavor factors., , , and . ICIT, page 2081-2086. IEEE, (2018)PESTAS: a web server for EST analysis and sequence mining., , , , , , , and . Bioinform., 25 (14): 1846-1848 (2009)Detection of unknown malicious script code using a conceptual graph and SVM., , , , and . RACS, page 310-315. ACM, (2012)An efficient mobile social search method., , , , , and . RACS, page 82-85. ACM, (2014)Comparison of Deep Learning based Fish Detection Performance for Real-Time Smart Fish Farming., , and . SMA, page 61-63. ACM, (2020)A New Control Service Model Based on CORBA for Distributed Multimedia Objects., , and . EUROMICRO, page 467-. IEEE Computer Society, (1996)Performance Evaluation of Cache Conscious Multi-dimensional Index Structures., , and . IKE, page 222-227. CSREA Press, (2004)Model-Based XML Editor Generation., , , , , , and . Software Engineering Research and Practice, page 212-218. CSREA Press, (2006)Fish Activity State and Fuzzy Inference based an Intelligence Fish Feeding Model., , , , , and . SMA, page 405-406. ACM, (2020)