Author of the publication

Distributed Detection of Zero-Day Network Traffic Flows.

, , , , , and . AusDM, volume 845 of Communications in Computer and Information Science, page 173-191. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comprehensive analysis of network traffic data., , , , and . Concurr. Comput. Pract. Exp., (2018)Automated Big Traffic Analytics for Cyber Security., , , , , and . CoRR, (2018)The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services., , , , , , , and . Proc. Priv. Enhancing Technol., 2021 (1): 209-228 (2021)Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey., , , , , and . ACM Comput. Surv., 54 (7): 139:1-139:36 (2022)FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation., , , , and . CoRR, (2022)Comprehensive Analysis of Network Traffic Data., , , , , and . CIT, page 423-430. IEEE Computer Society, (2016)Distributed Detection of Zero-Day Network Traffic Flows., , , , , and . AusDM, volume 845 of Communications in Computer and Information Science, page 173-191. Springer, (2017)No-Label User-Level Membership Inference for ASR Model Auditing., , , , , , and . ESORICS (2), volume 13555 of Lecture Notes in Computer Science, page 610-628. Springer, (2022)Visualization of big data security: a case study on the KDD99 cup data set., , , , and . Digit. Commun. Networks, 3 (4): 250-259 (2017)Big network traffic data visualization., , , , and . Multim. Tools Appl., 77 (9): 11459-11487 (2018)