15 results on '"Bahman Rashidi"'
Search Results
2. HoneyV: A virtualized honeynet system based on network softwarization.
3. A scalable and flexible DDoS mitigation system using network function virtualization.
4. DroidVisor: An Android secure application recommendation system.
5. Dynamic DDoS Defense Resource Allocation using Network Function Virtualization.
6. Android malicious application detection using support vector machine and active learning.
7. XDroid: An Android permission control using Hidden Markov chain and online learning.
8. VFence: A Defense against Distributed Denial of Service Attacks Using Network Function Virtualization.
9. BotTracer: Bot user detection using clustering method in RecDroid.
10. CoFence: A collaborative DDoS defence using network function virtualization.
11. Android Permission Recommendation Using Transitive Bayesian Inference Model.
12. A game-theoretic model for defending against malicious users in RecDroid.
13. Dude, ask the experts!: Android resource access permission recommendation with RecDroid.
14. RecDroid: a resource access permission control portal and recommendation service for smartphone users.
15. Demo: RecDroid: An Android Resource Access Permission Recommendation System.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.