Author of the publication

Scalable analytics to detect DNS misuse for establishing stealthy communication channels.

, , , , , , and . IBM J. Res. Dev., 60 (4): 3 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scaling Software Security Analysis to Millions of Malicious Programs and Billions of Lines of Code.. Carnegie Mellon University, USA, (2013)A Time-Based Key Management Protocol for Wireless Sensor Networks., , and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 314-328. Springer, (2007)MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation., , , , , and . EURASIP J. Information Security, (2014)Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis., , and . SecureComm (1), volume 304 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 278-298. Springer, (2019)Stream computing for large-scale, multi-channel cyber threat analytics., , , , , , , , and . IRI, page 8-15. IEEE Computer Society, (2014)Threat Intelligence Computing., , , , , , and . ACM Conference on Computer and Communications Security, page 1883-1898. ACM, (2018)BitShred: feature hashing malware for scalable triage and semantic analysis., , and . ACM Conference on Computer and Communications Security, page 309-320. ACM, (2011)An In-Vehicle Warning Information Provision Strategy for V2V-Based Proactive Traffic Safety Management., , , and . IEEE Trans. Intell. Transp. Syst., 23 (10): 19387-19398 (2022)Software Deception Steering through Version Emulation., , , , , and . HICSS, page 1-10. ScholarSpace, (2021)Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation., , , , , and . IEEE Symposium on Security and Privacy Workshops, page 61-64. IEEE Computer Society, (2014)