Author of the publication

Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection.

, , and . SIN, page 76-80. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Botnet Revenue Model., and . SIN, page 459. ACM, (2014)Preventing Ransomware Attacks Through File System Filter Drivers., , and . ITASEC, volume 2058 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection., , and . SIN, page 76-80. ACM, (2016)A Survey on Financial Botnets Threat., and . ICGS3, volume 534 of Communications in Computer and Information Science, page 172-181. Springer, (2015)An Operational Framework for Incident Handling., , and . ITASEC, volume 1816 of CEUR Workshop Proceedings, page 126-135. CEUR-WS.org, (2017)MP-Shield: A Framework for Phishing Detection in Mobile Devices., , , , and . CIT/IUCC/DASC/PICom, page 1977-1983. IEEE, (2015)Fast Mining of Large-Scale Logs for Botnet Detection: A Field Study., and . CIT/IUCC/DASC/PICom, page 1989-1996. IEEE, (2015)