Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Nektaria Potha"'
Publikováno v:
Symmetry, Vol 12, Iss 7, p 1128 (2020)
The openness of the Android operating system and its immense penetration into the market makes it a hot target for malware writers. This work introduces Androtomist, a novel tool capable of symmetrically applying static and dynamic analysis of applic
Externí odkaz:
https://doaj.org/article/9e0ef590085648eaabe1a22f73ad0289
Publikováno v:
Connection Science. 33:1077-1093
Malware detection is a fundamental task and associated with significant applications in humanities, cybersecurity, and social media analytics. In some of the relevant studies, there is substantial ...
Autor:
Christos Goumopoulos, Nektaria Potha
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing.
Autor:
Nektaria Potha, Efstathios Stamatatos
Publikováno v:
Knowledge and Information Systems. 62:1903-1921
Author verification is a fundamental problem in authorship attribution, and it suits most relevant applications where it is not possible to predefine a closed set of suspects. So far, the most successful approaches attempt to sample the non-target cl
Autor:
Efstathios Stamatatos, Nektaria Potha
Publikováno v:
Journal of the Association for Information Science and Technology. 70:1074-1088
Publikováno v:
Machine Learning for Networking ISBN: 9783030708658
MLN
MLN
Mobile malware poses undoubtedly a major threat to the continuously increasing number of mobile users worldwide. While researchers have been trying vigorously to find optimal detection solutions, mobile malware is becoming more sophisticated and its
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::65fde808090200b6aa8d12a72ba7475f
https://doi.org/10.1007/978-3-030-70866-5_4
https://doi.org/10.1007/978-3-030-70866-5_4
Publikováno v:
Symmetry, Vol 12, Iss 1128, p 1128 (2020)
Symmetry; Volume 12; Issue 7; Pages: 1128
Symmetry; Volume 12; Issue 7; Pages: 1128
The openness of the Android operating system and its immense penetration into the market makes it a hot target for malware writers. This work introduces Androtomist, a novel tool capable of symmetrically applying static and dynamic analysis of applic
Publikováno v:
Knowledge-Based Systems. 96:134-155
With the rapid growth of social media, users, especially adolescents, are spending significant amount of time on various social networking sites to connect with others, to share information, and to pursue common interests. However, as social networki
Autor:
Efstathios Stamatatos, Nektaria Potha
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030157111
ECIR (1)
ECIR (1)
Author verification is a fundamental task in authorship analysis and associated with significant applications in humanities, cyber-security, and social media analytics. In some of the relevant studies, there is evidence that heterogeneous ensembles c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::070984008424b7802b754a4e1ff3707b
https://doi.org/10.1007/978-3-030-15712-8_7
https://doi.org/10.1007/978-3-030-15712-8_7
Autor:
Nektaria Potha, Efstathios Stamatatos
Publikováno v:
SETN
Author verification is a fundamental task in authorship analysis and associated with important applications in humanities and forensics. In this paper, we propose the use of an intrinsic profile-based verification method that is based on latent seman