Cited By
View all- Katar OYıldırım Ö(2024)Classification of Malware Images Using Fine-Tunned ViTSakarya University Journal of Computer and Information Sciences10.35377/saucis...13410827:1(22-35)Online publication date: 30-Apr-2024
- Gray JSgandurra DCavallaro LBlasco Alis J(2024)Identifying Authorship in Malicious Binaries: Features, Challenges & DatasetsACM Computing Surveys10.1145/365397356:8(1-36)Online publication date: 26-Mar-2024
- Liu SZhang LTan TWang LWang PZhang ZZhang M(2024) Homomorphic encryption domain asymmetric fingerprinting scheme for 3D models of oblique photography Transactions in GIS10.1111/tgis.1316028:4(790-815)Online publication date: 22-Mar-2024
- Show More Cited By