has been cited by the following article(s):
|
[1]
|
A Novel Approach to Malware Detection: Converting Hardware Memory Data to 2D Barcodes Using Mobile Networks
Journal of Network and Systems Management,
2026
DOI:10.1007/s10922-025-09994-1
|
|
|
|
|
[2]
|
ÇİZGE SİNİR AĞLARI: GÖREVLER, BİLGİ GÜVENLİĞİ, SİBER GÜVENLİK VE ADLİ BİLİŞİM
İstanbul Ticaret Üniversitesi Teknoloji ve Uygulamalı Bilimler Dergisi,
2025
DOI:10.56809/icujtas.1562430
|
|
|
|
|
[3]
|
Memory Analysis for Malware Detection: A Comprehensive Survey Using the OSCAR Methodology
ACM Computing Surveys,
2025
DOI:10.1145/3764580
|
|
|
|
|
[4]
|
Deep Neural Networks Study for Advanced Code-reuse Attacks Detection
2025 IEEE 9th Forum on Research and Technologies for Society and Industry (RTSI),
2025
DOI:10.1109/RTSI64020.2025.11212515
|
|
|
|
|
[5]
|
A new proposal for the prediction of an aircraft engine fuel consumption: a novel CNN-BiLSTM deep neural network model
Aircraft Engineering and Aerospace Technology,
2023
DOI:10.1108/AEAT-05-2022-0132
|
|
|
|
|
[6]
|
Comparison of LSTM Architecture for Malware Classification
2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS),
2020
DOI:10.1109/ICIMCIS51567.2020.9354301
|
|
|
|