Author of the publication

HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis.

, , , , , , and . Secur. Commun. Networks, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Links between PPCA and subspace methods for complete Gaussian density estimation., and . IEEE Trans. Neural Networks, 17 (3): 789-792 (2006)An Adaptive Learning Rate for Stochastic Variational Inference., , , and . ICML (2), volume 28 of JMLR Workshop and Conference Proceedings, page 298-306. JMLR.org, (2013)Window mining by clustering mid-level representation for weakly supervised object detection., , and . ICIP, page 4067-4071. IEEE, (2014)Comparative performance analysis of SFH/FDM DRT and OBP satellite payloads under jamming., , and . ICC, page 3190-3194. IEEE, (2012)Approximate Analysis of Re-Entrant Lines with Bernoulli Reliability Models., and . CASE, page 398-403. IEEE, (2007)Short-Term Temporal Convolutional Networks for Dynamic Hand Gesture Recognition., , , , , and . CoRR, (2020)How to Reduce Software Development Cost with Personnel Assignment Optimization: Exemplary Improvement on the Hungarian Algorithm., , , and . EASE, page 270-279. ACM, (2017)Indexing implicit locations for geographical information retrieval., , , , and . GIR, Department of Geography, University of Zurich, (2006)Business Rule Engine-based Framework for SaaS Application Development., , , , and . CLOSER, page 345-354. SciTePress, (2012)Attention-based Graph Neural Network for Semi-supervised Learning., , , and . CoRR, (2018)