Alert button
Picture for Usue Mori

Usue Mori

Alert button

Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection

Add code
Bookmark button
Alert button
Oct 24, 2023
Borja Molina-Coronado, Antonio Ruggia, Usue Mori, Alessio Merlo, Alexander Mendiburu, Jose Miguel-Alonso

Viaarxiv icon

Towards a Fair Comparison and Realistic Design and Evaluation Framework of Android Malware Detectors

Add code
Bookmark button
Alert button
May 25, 2022
Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, Jose Miguel-Alonso

Figure 1 for Towards a Fair Comparison and Realistic Design and Evaluation Framework of Android Malware Detectors
Figure 2 for Towards a Fair Comparison and Realistic Design and Evaluation Framework of Android Malware Detectors
Figure 3 for Towards a Fair Comparison and Realistic Design and Evaluation Framework of Android Malware Detectors
Figure 4 for Towards a Fair Comparison and Realistic Design and Evaluation Framework of Android Malware Detectors
Viaarxiv icon

A review on outlier/anomaly detection in time series data

Add code
Bookmark button
Alert button
Feb 11, 2020
Ane Blázquez-García, Angel Conde, Usue Mori, Jose A. Lozano

Figure 1 for A review on outlier/anomaly detection in time series data
Figure 2 for A review on outlier/anomaly detection in time series data
Figure 3 for A review on outlier/anomaly detection in time series data
Figure 4 for A review on outlier/anomaly detection in time series data
Viaarxiv icon

Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process

Add code
Bookmark button
Alert button
Jan 27, 2020
Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, José Miguel-Alonso

Figure 1 for Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process
Figure 2 for Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process
Figure 3 for Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process
Figure 4 for Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process
Viaarxiv icon

A review on distance based time series classification

Add code
Bookmark button
Alert button
Jun 12, 2018
Amaia Abanda, Usue Mori, Jose A. Lozano

Figure 1 for A review on distance based time series classification
Figure 2 for A review on distance based time series classification
Figure 3 for A review on distance based time series classification
Figure 4 for A review on distance based time series classification
Viaarxiv icon