From post

MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data.

, , , и . CollaborateCom, том 268 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 488-503. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query., , , и . ICICS, том 11149 из Lecture Notes in Computer Science, стр. 685-695. Springer, (2018)A Malicious URL Detection Model Based on Convolutional Neural Network., , , , и . SocialSec, том 1298 из Communications in Computer and Information Science, стр. 34-40. Springer, (2020)Scenario-based analysis and synthesis of real-time systems using uppaal., , , и . DATE, стр. 447-452. IEEE Computer Society, (2010)MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data., , , и . CollaborateCom, том 268 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 488-503. Springer, (2018)A method based on hierarchical spatiotemporal features for trojan traffic detection., , , , и . CoRR, (2023)l-Leaks: Membership Inference Attacks with Logits., , , и . CoRR, (2022)SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification., , , , и . IEEE Trans. Inf. Forensics Secur., (2024)RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features., , , , , и . SEC, том 648 из IFIP Advances in Information and Communication Technology, стр. 126-141. Springer, (2022)An efficient online successive reanalysis method for dynamic topology optimization., , , , и . CoRR, (2023)A Dual-Branch Self-attention Method for Mobile Malware Detection via Network Traffic., , , и . IJCNN, стр. 1-8. IEEE, (2022)