Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SinkMiner: Mining Botnet Sinkholes for Fun and Profit., , , and . LEET, USENIX Association, (2013)Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining., , and . AsiaCCS, page 783-794. ACM, (2016)PeerRush: Mining for unwanted P2P traffic., , , and . J. Inf. Secur. Appl., 19 (3): 194-208 (2014)Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks., , and . ACM Trans. Priv. Secur., 19 (2): 4:1-4:31 (2016)PeerRush: Mining for Unwanted P2P Traffic., , , and . DIMVA, volume 7967 of Lecture Notes in Computer Science, page 62-82. Springer, (2013)Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks., , and . DSN, page 403-414. IEEE Computer Society, (2015)An Efficient Two-Layer Classification Approach for Hyperspectral Images., , and . MLDM (2), volume 10935 of Lecture Notes in Computer Science, page 87-102. Springer, (2018)Measuring and Detecting Malware Downloads in Live Network Traffic., , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 556-573. Springer, (2013)Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots., , , , , and . NDSS, The Internet Society, (2017)Exploring the Long Tail of (Malicious) Software Downloads., , and . DSN, page 391-402. IEEE Computer Society, (2017)