From post

Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.

, , , , , и . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, стр. 341-349. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A scalable and accurate feature representation method for identifying malicious mobile applications., , , , , и . SAC, стр. 1182-1189. ACM, (2019)An Accurate Packer Identification Method Using Support Vector Machine., , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (1): 253-263 (2014)Application of string kernel based support vector machine for malware packer identification., , , , и . IJCNN, стр. 1-8. IEEE, (2013)An autonomous online malicious spam email detection system using extended RBF network., , , , и . IJCNN, стр. 1-7. IEEE, (2015)Discovery of Relationships between Interests from Bulletin Board System by Dissimilarity Reconstruction., , и . Discovery Science, том 2843 из Lecture Notes in Computer Science, стр. 328-335. Springer, (2003)A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis., , и . ICONIP (2), том 6444 из Lecture Notes in Computer Science, стр. 267-274. Springer, (2010)Using Genetic Algorithm to Balance the D-Index Algorithm for Metric Search.. ICONIP (2), том 4985 из Lecture Notes in Computer Science, стр. 264-273. Springer, (2007)Fine-Grained Risk Level Quantication Schemes Based on APK Metadata., , , и . ICONIP (3), том 9491 из Lecture Notes in Computer Science, стр. 663-673. Springer, (2015)Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems., , , , , и . IEEE Access, (2022)Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks., , , , , , , , и . IEEE Access, (2021)