2

Secure blockchain decentralized voting for verified users
Analysis of Exploration Testing Approach and Conclusions  from Implementation in Software Development
Malware detection using Machine Learning algorithms and Reverse Engineering of Android java code
Android malware detection using machine learning and reverse engineering