Filter your results
- 4
- 4
- 4
- 4
- 1
- 2
- 1
- 4
- 4
- 3
- 3
- 3
- 3
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
An Efficient Unsavory Data Detection Method for Internet Big Data3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.213-220, ⟨10.1007/978-3-319-24315-3_21⟩
Conference papers
hal-01466222v1
|
||
|
A Semantic-Based Malware Detection System Design Based on Channels2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.653-662, ⟨10.1007/978-3-642-55032-4_67⟩
Conference papers
hal-01397283v1
|
||
|
An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.663-673, ⟨10.1007/978-3-642-55032-4_68⟩
Conference papers
hal-01397284v1
|
||
|
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.271-284, ⟨10.1007/978-3-642-36818-9_28⟩
Conference papers
hal-01480181v1
|