Author of the publication

A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets.

, , , and . Inf. Media Technol., 8 (3): 843-854 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating behavioral differences between IoT malware via function call sequence graphs., , , , and . SAC, page 1674-1682. ACM, (2021)Malicious Packet Classification Based on Neural Network Using Kitsune Features., , , , , , and . ISPR, volume 1589 of Communications in Computer and Information Science, page 306-314. Springer, (2022)Scalable and Fast Hierarchical Clustering of IoT Malware Using Active Data Selection., , , , and . FMEC, page 1-6. IEEE, (2021)Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads., , , , , , , and . AsiaJCIS, page 88-94. IEEE, (2023)A Behavior-Based Detection Method for Outbreaks of Low-Rate Attacks., , , and . SAINT, page 267-272. IEEE Computer Society, (2012)An improved upper bound on block error probability of least squares superposition codes with unbiased Bernoulli dictionary., and . ISIT, page 1168-1172. IEEE, (2016)Least Squares Superposition Codes With Bernoulli Dictionary are Still Reliable at Rates up to Capacity., , and . IEEE Trans. Inf. Theory, 60 (5): 2737-2750 (2014)Boundedness of modified multiplicative updates for nonnegative matrix factorization., , and . CAMSAP, page 252-255. IEEE, (2013)Least squares superposition codes with Bernoulli dictionary are still reliable at rates up to capacity., , and . ISIT, page 1396-1400. IEEE, (2013)Stochastic interpretation of universal portfolio and generalized target classes., and . ISIT, page 390-394. IEEE, (2011)