Sciweavers

31 search results - page 7 / 7
» Dynamic Optimization of Secure Mobile Sensor Networks: A Gen...
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 10 days ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...