Author of the publication

C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement.

, , , , , and . Comput. Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors., , , , , , , and . IEEE J. Sel. Areas Commun., 39 (8): 2632-2647 (2021)Characteristics analysis at prefix granularity: A case study in an IPv6 network., , , , , and . J. Netw. Comput. Appl., (2016)Dual Channel Adaptive Congestion Control for Datacenters., , , , and . INFOCOM Workshops, page 514-521. IEEE, (2019)Improving the Performance of Online Bitrate Adaptation with Multi-Step Prediction Over Cellular Networks., , , and . IEEE Trans. Mob. Comput., 20 (1): 174-187 (2021)A study of traffic, user behavior and pricing policies in a large campus network., , and . Comput. Commun., 34 (16): 1922-1931 (2011)Towards securing Duplicate Address Detection using P4., , , , and . Comput. Networks, (2021)EvoIoT: An evolutionary IoT and non-IoT classification model in open environments., , , , , , and . Comput. Networks, (2022)FluxInfer: Automatic Diagnosis of Performance Anomaly for Online Database System., , , , , and . IPCCC, page 1-8. IEEE, (2020)ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment., , , , , , and . NDSS, The Internet Society, (2022)DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications., , , , , , , , and . CCS, page 3197-3217. ACM, (2021)