Author of the publication

Malware Traffic Classification Based on Recurrence Quantification Analysis.

, , , and . Int. J. Netw. Secur., 22 (3): 449-459 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

End-to-end encrypted traffic classification with one-dimensional convolution neural networks., , , , and . ISI, page 43-48. IEEE, (2017)A storage approach for OpenFlow switch based on Protocol Oblivious Forwarding., , , , and . ISCC, page 1145-1150. IEEE Computer Society, (2016)Optimal Buffer Management Strategy for Minimizing Delivery Latency of Streaming Data with Packet Dependencies., , , and . IEICE Trans. Commun., 99-B (7): 1501-1510 (2016)Multi-model coupling method for imbalanced network traffic classification based on clustering., , and . Int. J. High Perform. Comput. Netw., 16 (1): 26-35 (2020)A Packet-Length-Adjustable Attention Model Based on Bytes Embedding Using Flow-WGAN for Smart Cybersecurity., , and . IEEE Access, (2019)High Throughput Implementation of SMS4 on FPGA., , and . IEEE Access, (2019)Goodput guaranteed buffer management strategy for streaming data with packet dependencies., , , and . ISCC, page 880-885. IEEE Computer Society, (2016)High-Performance Implementation of Dynamically Configurable Load Balancing Engine on FPGA., , , and . IEEE Communications Magazine, 58 (1): 62-67 (2020)HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection., , , , , , and . IEEE Access, (2018)Fast Montgomery Modular Multiplication and Squaring on Embedded Processors., , , and . IEICE Transactions, 100-B (5): 680-690 (2017)