Author of the publication

Building a Scalable System for Stealthy P2P-Botnet Detection.

, , , , and . IEEE Trans. Inf. Forensics Secur., 9 (1): 27-38 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Still Beheading Hydras: Botnet Takedowns Then and Now., , and . IEEE Trans. Dependable Secur. Comput., 14 (5): 535-549 (2017)SURF: detecting and measuring search poisoning., , and . ACM Conference on Computer and Communications Security, page 467-476. ACM, (2011)Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis., , and . IEEE Trans. Dependable Secur. Comput., 9 (5): 714-726 (2012)Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining., , and . AsiaCCS, page 783-794. ACM, (2016)Towards Measuring the Effectiveness of Telephony Blacklists., , , and . NDSS, The Internet Society, (2018)Network Intrusion Detection by Combining One-Class Classifiers., , and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 58-65. Springer, (2005)VAMO: towards a fully automated malware clustering validity analysis., and . ACSAC, page 329-338. ACM, (2012)Understanding the prevalence and use of alternative plans in malware with network games., , , and . ACSAC, page 1-10. ACM, (2011)Detecting and Tracking the Rise of DGA-Based Malware., , , and . login Usenix Mag., (2012)Beheading hydras: performing effective botnet takedowns., , , , and . ACM Conference on Computer and Communications Security, page 121-132. ACM, (2013)