Year |
Citation |
Score |
2018 |
Huang H, Zheng C, Zeng J, Zhou W, Zhu S, Liu P, Molloy I, Chari S, Zhang C, Guan Q. A Large-scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform Ieee Transactions On Big Data. 1-1. DOI: 10.1109/Tbdata.2018.2790439 |
0.311 |
|
2016 |
Chari SN, Habeck TA, Molloy I, Park Y, Rao JR, Teiken W. A platform and analytics for usage and entitlement analytics Journal of Reproduction and Development. 60: 7. DOI: 10.1147/Jrd.2016.2560558 |
0.473 |
|
2015 |
Park Y, Molloy IM, Chari SN, Xu Z, Gates C, Li N. Learning from others: User anomaly detection using anomalous samples from other users Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9327: 396-414. DOI: 10.1007/978-3-319-24177-7_20 |
0.337 |
|
2014 |
Gates CS, Li N, Peng H, Sarma B, Qi Y, Potharaju R, Nita-Rotaru C, Molloy I. Generating summary risk scores for mobile applications Ieee Transactions On Dependable and Secure Computing. 11: 238-251. DOI: 10.1109/Tdsc.2014.2302293 |
0.453 |
|
2014 |
Luo W, Li X, Molloy I, Di L, Stepinski T. Web Service for extracting stream networks from DEM data Geojournal. 79: 183-193. DOI: 10.1007/S10708-013-9502-1 |
0.333 |
|
2012 |
Li T, Li N, Zhang J, Molloy I. Slicing: A New Approach for Privacy Preserving Data Publishing Ieee Transactions On Knowledge and Data Engineering. 24: 561-574. DOI: 10.1109/Tkde.2010.236 |
0.559 |
|
2010 |
Molloy I, Chen H, Li T, Wang Q, Li N, Bertino E, Calo S, Lobo J. Mining Roles with Multiple Objectives Acm Transactions On Information and System Security. 13: 36. DOI: 10.1145/1880022.1880030 |
0.569 |
|
Show low-probability matches. |