Author of the publication

A network attack forensic platform against HTTP evasive behavior.

, , , , , and . J. Supercomput., 73 (7): 3053-3064 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Middleware-based solution for enterprise information integration., , , and . ETFA (2), page 687-690. IEEE, (2001)0-7803-7241-7.A Multi-Stream Feature Fusion Approach for Traffic Prediction., , , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (2): 1456-1466 (2022)TiDEC: A Two-Layered Integrated Decision Cycle for Population Evolution., , , , and . IEEE Trans. Cybern., 51 (12): 5897-5906 (2021)TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection., , , , , and . WWW, page 661-669. ACM, (2022)POSTER: An Empirical Measurement Study on Multi-tenant Deployment Issues of CDNs., , , , and . CCS, page 2471-2473. ACM, (2017)Framework and Key Technologies for High-speed Railway Comprehensive Transport Hub., , , , , and . DTPI, page 1-5. IEEE, (2023)Traffic spills the beans: A robust video identification attack against YouTube., , , , , , and . Comput. Secur., (February 2024)UAV Assisted Bridge Defect Inspection System., , , , , , , , , and 2 other author(s). IFIP TC12 ICIS, volume 539 of IFIP Advances in Information and Communication Technology, page 401-411. Springer, (2018)Non-GPS positioning sensor network in social manufacturing., , , , and . SOLI, page 47-52. IEEE, (2016)Social manufacturing realizing personalization production: A state-of-the-art review., , , , and . SOLI, page 7-11. IEEE, (2016)