Author of the publication

Traffic Replay in Virtual Network Based on IP-Mapping.

, , , , and . ICA3PP (4), volume 9531 of Lecture Notes in Computer Science, page 697-713. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Black box attack and network intrusion detection using machine learning for malicious traffic., , , , , and . Comput. Secur., (2022)An empirical study of vulnerability discovery methods over the past ten years., , , , , and . Comput. Secur., (2022)MalPro: Learning on Process-Aware Behaviors for Malware Detection., , , , , , , , and . ISCC, page 1-7. IEEE, (2022)Mal-Bert-GCN: Malware Detection by Combining Bert and GCN., , , , , and . TrustCom, page 175-183. IEEE, (2022)Piccolo: A Fast and Efficient Rollback System for Virtual Machine Clusters., , , , and . ICPP, page 87-92. IEEE Computer Society, (2016)VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches., , , , , , and . Comput. Secur., (2021)CADM: A Centralized Administration and Dynamic Monitoring Framework for Network Intrusion Detection Based on Virtualization., , and . PDCAT, page 111-116. IEEE, (2013)Traffic Replay in Virtual Network Based on IP-Mapping., , , , and . ICA3PP (4), volume 9531 of Lecture Notes in Computer Science, page 697-713. Springer, (2015)API2Vec: Learning Representations of API Sequences for Malware Detection., , , , , and . ISSTA, page 261-273. ACM, (2023)A High-Efficiency and Comprehensive Dynamic Behavior Analysis System for Malware based on Hardware Virtualization., , , , , and . HPCC/DSS/SmartCity, page 722-727. IEEE, (2020)