Cited By
View all- Jin BChoi JHong JKim H(2023)On the Effectiveness of Perturbations in Generating Evasive Malware VariantsIEEE Access10.1109/ACCESS.2023.326226511(31062-31074)Online publication date: 2023
- Miura HKimura TAman HHirata K(2023)Game-theoretic approach to epidemic modeling of countermeasures against future malware evolutionComputer Communications10.1016/j.comcom.2023.05.001206:C(160-171)Online publication date: 1-Jun-2023
- Tirumala SNepal NRay S(2022)Raspberry Pi-based Intelligent Cyber Defense Systems for SMEs and Smart-homes: An Exploratory StudyEAI Endorsed Transactions on Smart Cities10.4108/eetsc.v6i18.23456:18(e4)Online publication date: 3-Aug-2022
- Show More Cited By