17 results on '"Travis Atkison"'
Search Results
2. Preliminary research on thesaurus-based query expansion for Twitter data extraction.
3. Causes, impacts, and detection approaches of code smell: a survey.
4. Testing vulnerabilities in bluetooth low energy.
5. An Experimental Analysis of Windows Log Events Triggered by Malware.
6. A Comparison of Features for Android Malware Detection.
7. A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future Suggestions.
8. Evaluation of Firefox Browser Forensics Tools.
9. Applying static analysis to high-dimensional malicious application detection.
10. Observing industrial control system attacks launched via metasploit framework.
11. Evolution of digital forensics in virtualization by using virtual machine introspection.
12. Evolution of traditional digital forensics in virtualization.
13. Applying random projection to the classification of malicious applications using data mining algorithms.
14. Using randomized projection techniques to aid in detecting high-dimensional malicious applications.
15. Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications.
16. Digital forensics on a virtual machine.
17. Aiding prediction algorithms in detecting high-dimensional malicious applications using a randomized projection technique.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.