Integrated Repository of Security Information for Network Security Evaluation, JoWUA, vol.6, issue.2, pp.41-57, 2015. ,
Comparative Analysis of Voting Schemes for Ensemble-based Malware Detection, JoWUA, vol.4, issue.1, pp.98-117, 2013. ,
Securing mobile devices: malware mitigation methods, JoWUA, vol.6, issue.2, pp.78-97, 2015. ,
A Convergent Solution to Matrix Bidirectional Projection Based Feature Extraction with Application to Face Recognition, International Journal of Computational Intelligence Systems, vol.4, issue.5, pp.863-873, 2011. ,
DOI : 10.1080/18756891.2011.9727837
Searching in high-dimensional spaces: Index structures for improving the performance of multimedia databases, ACM Computing Surveys, vol.33, issue.3, pp.322-373, 2001. ,
DOI : 10.1145/502807.502809
Making the pyramid technique robust to query types and workloads, Proceedings. 20th International Conference on Data Engineering, p.313, 2004. ,
DOI : 10.1109/ICDE.2004.1320007
Robust local tangent space alignment via iterative weighted PCA, Neurocomputing, vol.74, issue.11, pp.1985-1993, 2011. ,
DOI : 10.1016/j.neucom.2010.06.029