MALICIOUS CODE DETECTION
Experts
- Bhavani M. Thuraisingham
- Suryadipta Majumdar
- Yosr Jarraya
- Mourad Debbabi
- Makan Pourzandi
- Lingyu Wang
- Adrian V. Gheorghe
- Taous Madi
- Mohammad S. Obaidat
- Helge Janicke
- Marcelo Masera
- Amine Baïna
- Latifur Khan
- Chi Zhang
- Mohamed Amine Ferrag
- Leandros A. Maglaras
- Antonios Gouglidis
- Azidine Guezzaz
- Said Benkirane
- Francesco Sovrano
- Meikang Qiu
- Theodore B. Zahariadis
- Nora Cuppens-Boulahia
- Thomas Schaberreiter
- John Kissell
- László Gönczy
- Bingwei Liu
- Carmelo Di Mauro
- Makhlouf Derdour
- Mohammad M. Masud
- Bernhard Westfechtel
- Konrad Wolsing
- Huaxing Zhu
- Jan Pennekamp
- William Hurst
- Yunfa Li
- Rohan Alur
- Kazuhisa Yamada
- Hussein T. Mouftah
Venues
- CoRR
- Int. J. Crit. Infrastructures
- CRITIS
- IEEE Access
- ARES
- Comput. Secur.
- Inf. Secur. J. A Glob. Perspect.
- ISI
- ACSAC
- Sensors
- Int. J. Crit. Infrastructure Prot.
- SMC
- WINCOM
- IEEE Syst. J.
- Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
- Expert Syst. Appl.
- Clust. Comput.
- SIGUCCS
- SAFECOMP Workshops
- Future Internet
- Telecommun. Syst.
- IDAACS
- Reliab. Eng. Syst. Saf.
- SmartGridComm
- Netw. Secur.
- IACR Cryptol. ePrint Arch.
- Int. J. Commun. Syst.
- ICIT
- Simul.
- PAIS
- ICT
- Ad Hoc Networks
- IEICE Trans. Commun.
- INCoS
- Int. J. Secur. Networks
- UKSim
- CloudCom
- EDCC
- J. Netw. Comput. Appl.
Related Topics
Related Keywords
Popularity
No popularities found. Try to change the filters.
Popularity Trend