July 2018, Volume 10, Number 4
Mining Patterns of Sequential Malicious APIs to Detect Malware
Abdurrahman Pektas1, Elif Nurdan Pektas2 and Tankut Acarman1, 1Galatasaray University, Turkey and 2Siemens - Turkey, Turkey
http://aircconline.com/ijnsa/V10N4/10418ijnsa01.pdf
A Method for Encrypting and Decrypting Wave Files
Mohamad M. Al-laham, Mohamad a. Mai'iteh, Hasan Rashaideh and Ziad Al-Qadi, Al-Balqa Applied University, Jordan
http://aircconline.com/ijnsa/V10N4/10418ijnsa02.pdf
http://airccse.org/journal/jnsa18_current.html
Mining Patterns of Sequential Malicious APIs to Detect Malware
Abdurrahman Pektas1, Elif Nurdan Pektas2 and Tankut Acarman1, 1Galatasaray University, Turkey and 2Siemens - Turkey, Turkey
http://aircconline.com/ijnsa/V10N4/10418ijnsa01.pdf
A Method for Encrypting and Decrypting Wave Files
Mohamad M. Al-laham, Mohamad a. Mai'iteh, Hasan Rashaideh and Ziad Al-Qadi, Al-Balqa Applied University, Jordan
http://aircconline.com/ijnsa/V10N4/10418ijnsa02.pdf
http://airccse.org/journal/jnsa18_current.html
No comments:
Post a Comment