Author of the publication

0day Anomaly Detection Made Possible Thanks to Machine Learning

, , and . Wired/Wireless Internet Communications, volume 6074 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 10.1007/978-3-642-13315-2_27.(2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CNAME Cloaking-Based Tracking on the Web: Characterization, Detection, and Protection., , and . IEEE Trans. Netw. Serv. Manag., 18 (3): 3873-3888 (2021)On the use of Sub-Space Clustering & Evidence Accumulation for traffic analysis & classification., , and . IWCMC, page 1016-1021. IEEE, (2011)Identifying Coordination of Network Scans Using Probed Address Structure., , and . TMA, IFIP, (2016)Identifying and characterizing ZMap scans: a cryptanalytic approach., and . CoRR, (2019)Anomalous Cluster Detection in Large Networks with Diffusion-Percolation Testing., , and . ESANN, (2021)ML-based tunnel detection and tunneled application classification., , and . CoRR, (2022)0day Anomaly Detection Made Possible Thanks to Machine Learning, , and . Wired/Wireless Internet Communications, volume 6074 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 10.1007/978-3-642-13315-2_27.(2010)MINETRAC: Mining flows for unsupervised analysis & semi-supervised classification., , and . ITC, page 87-94. IEEE, (2011)Percolation-Based Detection of Anomalous Subgraphs in Complex Networks., , and . IDA, volume 12080 of Lecture Notes in Computer Science, page 287-299. Springer, (2020)A comparison of web privacy protection techniques., , and . Comput. Commun., (2019)