Author of the publication

Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications.

, , , and . KSII Trans. Internet Inf. Syst., 13 (3): 1284-1297 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application traffic classification using payload size sequence signature., , , and . Int. J. Netw. Manag., (2017)The Method of Clustering Network Traffic Classifications for Extracting Payload Signature by Function., , , , and . ICTC, page 1335-1337. IEEE, (2018)Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services., , and . KSII Trans. Internet Inf. Syst., 12 (4): 1572-1593 (2018)Key-count differential-based proactive key relay algorithm for scalable quantum-secured networking., , , and . J. Opt. Commun. Netw., 15 (5): 282-293 (May 2023)Effective behavior signature extraction method using sequence pattern algorithm for traffic identification., , , , , and . Int. J. Netw. Manag., (2018)A message keyword extraction approach by accurate identification of field boundaries., , , and . Int. J. Netw. Manag., (2021)Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications., , , and . KSII Trans. Internet Inf. Syst., 13 (3): 1284-1297 (2019)Survey on network protocol reverse engineering approaches, methods and tools., , , , , and . APNOMS, page 271-274. IEEE, (2017)Framework for precise protocol reverse engineering based on network traces., , , and . NOMS, page 1-4. IEEE, (2018)HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods., , , and . (May 2022)