Author of the publication

Feature Engineering and Machine Learning Model Comparison for Malicious Activity Detection in the DNS-Over-HTTPS Protocol.

, , , , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection and Characterization of DDoS Attacks Using Time-Based Features., , , , , , , and . IEEE Access, (2022)Event Detection and Localization Using Sensor Networks., and . ICWN, page 103-108. CSREA Press, (2009)Social network analysis of twitter use during the AERA 2017 annual conference., , , and . Educ. Inf. Technol., 24 (1): 459-470 (2019)Towards Detecting and Classifying Malicious URLs Using Deep Learning., , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 11 (4): 31-48 (2020)Switching intentions in the context of open-source software movement: The paradox of choice., , and . Educ. Inf. Technol., 27 (2): 1379-1395 (2022)Knowledge Based Discovery of Phishing Attacks., , , , and . IICAI, page 731-742. IICAI, (2007)Feature Selection for Improved Phishing Detection., , and . IEA/AIE, volume 7345 of Lecture Notes in Computer Science, page 252-261. Springer, (2012)Learning to Detect Phishing Webpages., and . J. Internet Serv. Inf. Secur., 4 (3): 21-39 (2014)Mining Web to Detect Phishing URLs., and . ICMLA (1), page 568-573. IEEE, (2012)Application of Deep Learning on the Characterization of Tor Traffic using Time based Features., , , , , and . J. Internet Serv. Inf. Secur., 11 (1): 44-63 (2021)