Hassan Azwar's scientific contributions
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (2)
Citations
... Te Drebin dataset [113,114] is one of the most used datasets in mobile security, with 5500+ malware being included in the dataset belonging to 20 families, collected from 2010 to 2012. Te android adware and general malware dataset (AAGM) [115,116] includes network activity of 1900 adware, general malware, and benignware running on android smartphones. Te IoTID20 [117] is a more recent dataset used to simulate network attack retrieved from two smart home devices. ...
... Neural network technologies and feature selection algorithms can be offered to learn attack patterns efficiently and identify intrusions effectively [16]. ...