Author of the publication

Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?

, , , , , , , , , and . PerCom Workshops, page 376-379. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint., , and . IEEE Access, (2023)Scalable and Fast Algorithm for Constructing Phylogenetic Trees With Application to IoT Malware Clustering., , , , , and . IEEE Access, (2023)Work in Progress: New Seed Set Selection Method of the Scalable Method for Constructing Phylogenetic Trees., , , , and . CF, page 364-365. ACM, (2023)Which Packet Did They Catch? Associating NIDS Alerts with Their Communication Sessions., , , , , and . AsiaJCIS, page 9-16. IEEE, (2021)Internet-Wide Scanner Fingerprint Identifier Based on TCP/IP Header., , , and . FMEC, page 1-6. IEEE, (2021)FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities., , , , , and . IEEE Trans. Emerg. Top. Comput., 11 (4): 934-949 (October 2023)Wafer Type Ion Energy Monitoring Sensor for Plasma Diagnosis., , , , and . Sensors, 23 (5): 2410 (March 2023)Investigating behavioral differences between IoT malware via function call sequence graphs., , , , and . SAC, page 1674-1682. ACM, (2021)Malicious Packet Classification Based on Neural Network Using Kitsune Features., , , , , , and . ISPR, volume 1589 of Communications in Computer and Information Science, page 306-314. Springer, (2022)Towards Functional Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering., , , , , , and . COMPSAC, page 1552-1557. IEEE, (2023)