Author of the publication

An approach for detection and family classification of malware based on behavioral analysis.

, , , and . ICNC, page 1-5. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diving Deep With BotLab-DS1: A Novel Ground Truth-Empowered Botnet Dataset., , , , , and . IEEE Access, (2024)An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records., , , and . CNS, page 164-172. IEEE, (2021)A Framework for Planning a Unified Wired and Wireless ICT Infrastructure., , , , and . Wirel. Pers. Commun., 54 (1): 169-185 (2010)Converged Optical Network and Data Center Virtual Infrastructure Planning., , , and . JOCN, 4 (9): 681-691 (2012)A novel methodology towards a trusted environment in mashup web applications., , , and . Comput. Secur., (2015)Using Google Earth for Visualization in FTTH Network Planning., , and . IP&C, volume 84 of Advances in Intelligent and Soft Computing, page 379-389. Springer, (2010)Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots., , and . ACSAC, page 742-755. ACM, (2022)Characterization of Static/Dynamic Topological Routing for Grid Networks., , , , and . ICN, page 367-373. IEEE Computer Society, (2009)Enterprise Architecture Oriented Requirements Engineering for Open Data Usage in Schools., , and . BIR, volume 365 of Lecture Notes in Business Information Processing, page 135-147. Springer, (2019)Moodle: Practical Advices for University Teachers., and . IP&C, volume 681 of Advances in Intelligent Systems and Computing, page 183-190. Springer, (2017)