Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint., , and . IEEE Access, (2023)Scalable and Fast Algorithm for Constructing Phylogenetic Trees With Application to IoT Malware Clustering., , , , , and . IEEE Access, (2023)Work in Progress: New Seed Set Selection Method of the Scalable Method for Constructing Phylogenetic Trees., , , , and . CF, page 364-365. ACM, (2023)Which Packet Did They Catch? Associating NIDS Alerts with Their Communication Sessions., , , , , and . AsiaJCIS, page 9-16. IEEE, (2021)Internet-Wide Scanner Fingerprint Identifier Based on TCP/IP Header., , , and . FMEC, page 1-6. IEEE, (2021)FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities., , , , , and . IEEE Trans. Emerg. Top. Comput., 11 (4): 934-949 (October 2023)Wafer Type Ion Energy Monitoring Sensor for Plasma Diagnosis., , , , and . Sensors, 23 (5): 2410 (March 2023)Scalable and Fast Hierarchical Clustering of IoT Malware Using Active Data Selection., , , , and . FMEC, page 1-6. IEEE, (2021)Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads., , , , , , , and . AsiaJCIS, page 88-94. IEEE, (2023)Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering., , , , , , and . COMPSAC, page 1552-1557. IEEE, (2023)