Mai Iwamoto

According to our database1, Mai Iwamoto authored at least 4 papers between 2012 and 2016.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
A Study of Malicious PDF Detection Technique.
Proceedings of the 10th International Conference on Complex, 2016

2014
Detection of JavaScript of Malware with Un-readability Using Mahalanobis-Distance.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2012
Token-based Code Clone Detection Technique in a Student's Programming Exercise.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012


  Loading...