Author of the publication

Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic.

, , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Duplicate detection methodology for IP network traffic analysis., , , and . M&N, page 161-166. IEEE, (2013)Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic., , , and . CoRR, (2022)The effect of burst formation timers on video streaming over optical burst switched networks., , , and . BROADNETS, page 282-289. IEEE, (2008)Online classification of user activities using machine learning on network traffic., , , and . Comput. Networks, (2020)Network monitoring for energy efficiency in large-scale networks: the case of the Spanish Academic Network., , , , , , , and . J. Supercomput., 62 (3): 1284-1304 (2012)Strategies for the interconnection of heterogeneous optical networks., , , , , , , , , and 1 other author(s). ICTON, page 1-4. IEEE, (2014)Evaluation of RTT as an Estimation of Interactivity Time for QoE Evaluation in Remote Desktop Environments., , , and . ITNAC, page 240-245. IEEE, (2023)KISS Methodologies for Network Management and Anomaly Detection., , and . SoftCOM, page 1-6. IEEE, (2018)Alias resolution techniques: long-term analysis of alias stability in internet routers., , , and . PM2HW2N@MSWiM, page 5-12. ACM, (2013)Effective Analysis of Secure Web Response Time., , , and . TMA, page 145-152. IEEE, (2019)