Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts., , , , , and . TrustCom/BigDataSE/ISPA (1), page 758-765. IEEE, (2015)A Comprehensive Measurement of Cloud Service Abuse., , , and . J. Inf. Process., (2021)Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs., , , , , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (12): 2149-2161 (2018)To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 104-A (1): 162-181 (2021)Classification of diversified web crawler accesses inspired by biological adaptation., , , , and . Int. J. Bio Inspired Comput., 17 (3): 165-173 (2021)Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning., , , , and . GLOBECOM, page 1-7. IEEE, (2016)Precise and Robust Detection of Advertising Fraud., , , and . COMPSAC (1), page 776-785. IEEE, (2019)Detecting Phishing Sites Using ChatGPT., , , and . CoRR, (2023)Auto-creation of Android Malware Family Tree., , , and . ICC, page 1-6. IEEE, (2021)Detecting Malware-infected Hosts Using Templates of Multiple HTTP Requests., , , , , and . CCNC, page 1-2. IEEE, (2020)