William J. Glodek

According to our database1, William J. Glodek authored at least 3 papers between 2012 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Detecting malicious Android applications from runtime behavior.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2013
Rapid Permissions-Based Detection and Analysis of Mobile Malware Using Random Decision Forests.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2012
Identification of anomalous network security token usage via clustering and density estimation.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012


  Loading...