Detection of Metamorphic Malware based on HMM: A Hierarchical Approach
Mina Gharacheh,
Vali Derhami,
Sattar Hashemi,
Seyed Mehdi Hazrati Fard
A Novel Framework to Carry Out Cloud Penetration Test
Jianbin Hu,
Yonggang Wang,
Cong Tang,
Zhi Guan,
Fengxian Ren,
Zhong Chen
Application of Artificial Neural Network for Clutter Rejection
Priyabrata Karmakar,
Sourav Dhar,
Mithun Chakraborty,
Tirthankar Paul
Classification via Clustering for Anonymization Data
Sridhar Mandapati,
Raveendra Babu Bhogapathi,
M.V.P.C.Sekhara Rao