Author of the publication

Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models.

, , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 623-631. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Enforcement of Security Policies on Choreographed Services., and . FMS @ Petri Nets, volume 1158 of CEUR Workshop Proceedings, page 53-67. CEUR-WS.org, (2014)QoS monitor as a service., , and . Softw. Qual. J., 28 (3): 1279-1301 (2020)Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach., , and . SECRYPT, page 66-74. SciTePress, (2010)Formal enforcement of security policies on concurrent systems., , and . J. Symb. Comput., 46 (9): 997-1016 (2011)Traffic Analysis of Web Browsers., and . FMS @ Petri Nets, volume 1158 of CEUR Workshop Proceedings, page 20-33. CEUR-WS.org, (2014)Toward an Algebraic Framework for Security Policy Enforcement in Concurrent Systems., , and . Security and Management, page 400-405. CSREA Press, (2010)Consumer oriented web services ranking and classification., and . ICC, page 1-7. IEEE, (2017)Automatic Enforcement of Security in Computer Networks., , , , and . SoMeT, volume 161 of Frontiers in Artificial Intelligence and Applications, page 200-222. IOS Press, (2007)Formal and Efficient Enforcement of Security Policies., and . FCS, page 143-149. CSREA Press, (2005)Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models., , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 623-631. Springer, (2014)