Author of the publication

ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries.

, , , , , and . IEEE Trans. Ind. Informatics, 16 (2): 1373-1384 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward inference attacks for k-anonymity., , , and . Personal and Ubiquitous Computing, 18 (8): 1871-1880 (2014)Enhancing the Trajectory Privacy with Laplace Mechanism., , and . TrustCom/BigDataSE/ISPA (1), page 1218-1223. IEEE, (2015)WaterPurifier: A scalable system to prevent the DNS water torture attack in 5G-enabled SIoT network., , , , , and . Comput. Commun., (February 2023)A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment., , , , , , and . IEEE Access, (2020)A novel logic-based automatic approach to constructing compliant security policies., , , and . Sci. China Inf. Sci., 55 (1): 149-164 (2012)Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection., , , , and . IEEE Trans. Knowl. Data Eng., 35 (5): 4754-4766 (May 2023)EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application., , , , , , , and . Secur. Commun. Networks, (2022)A Blockchain-Based IoT Cross-Domain Delegation Access Control Method., , , , and . Secur. Commun. Networks, (2021)Rinegan: A Scalable Image Processing Architecture for Large Scale Surveillance Applications., , , , , and . Frontiers Neurorobotics, (2021)A privacy-preserving botnet detection approach in largescale cooperative IoT environment., , , , and . Neural Comput. Appl., 35 (19): 13725-13737 (July 2023)