Sciweavers

WEBI   2009 Web Intelligence: Research and Development
Wall of Fame | Most Viewed WEBI-2009 Paper
WEBI
2009
Springer
14 years 7 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source725
2Download preprint from source427
3Download preprint from source204
4Download preprint from source200
5Download preprint from source192
6Download preprint from source191
7Download preprint from source181
8Download preprint from source176
9Download preprint from source175
10Download preprint from source166
11Download preprint from source165
12Download preprint from source165
13Download preprint from source152
14Download preprint from source141
15Download preprint from source139
16Download preprint from source136
17Download preprint from source131
18Download preprint from source126
19Download preprint from source125
20Download preprint from source124
21Download preprint from source123
22Download preprint from source122
23Download preprint from source121
24Download preprint from source120
25Download preprint from source120
26Download preprint from source119
27Download preprint from source115
28Download preprint from source113
29Download preprint from source112
30Download preprint from source107
31Download preprint from source107
32Download preprint from source103
33Download preprint from source102
34Download preprint from source100
35Download preprint from source97
36Download preprint from source89
37Download preprint from source88
38Download preprint from source88
39Download preprint from source87
40Download preprint from source86
41Download preprint from source85
42Download preprint from source85
43Download preprint from source85