Author of the publication

A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets.

, , , and . Inf. Media Technol., 8 (3): 843-854 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating behavioral differences between IoT malware via function call sequence graphs., , , , and . SAC, page 1674-1682. ACM, (2021)Malicious Packet Classification Based on Neural Network Using Kitsune Features., , , , , , and . ISPR, volume 1589 of Communications in Computer and Information Science, page 306-314. Springer, (2022)Least Squares Superposition Codes With Bernoulli Dictionary are Still Reliable at Rates up to Capacity., , and . IEEE Trans. Inf. Theory, 60 (5): 2737-2750 (2014)Stochastic interpretation of universal portfolio and generalized target classes., and . ISIT, page 390-394. IEEE, (2011)Boundedness of modified multiplicative updates for nonnegative matrix factorization., , and . CAMSAP, page 252-255. IEEE, (2013)Least squares superposition codes with Bernoulli dictionary are still reliable at rates up to capacity., , and . ISIT, page 1396-1400. IEEE, (2013)Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering., , , , , , and . COMPSAC, page 1552-1557. IEEE, (2023)An improved upper bound on block error probability of least squares superposition codes with unbiased Bernoulli dictionary., and . ISIT, page 1168-1172. IEEE, (2016)Scalable and Fast Hierarchical Clustering of IoT Malware Using Active Data Selection., , , , and . FMEC, page 1-6. IEEE, (2021)Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads., , , , , , , and . AsiaJCIS, page 88-94. IEEE, (2023)