Author of the publication

Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat.

, , , , , , and . SECURWARE, page 195-200. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network anomaly detection using a cross-correlation-based long-range dependence analysis., , , , and . Int. J. Netw. Manag., (2020)Mining writeprints from anonymous e-mails for forensic investigation., , , and . Digital Investigation, 7 (1-2): 56-64 (2010)Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats., , , , , , and . IEEE Access, (2019)A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection., , , , , and . IEEE Access, (2018)A unified data mining solution for authorship analysis in anonymous textual communications., , , and . Inf. Sci., (2013)Characterization of Covert Channels in DNS., , , and . NTMS, page 1-5. IEEE, (2014)Multidimensional investigation of source port 0 probing., , , and . Digital Investigation, 11 (S-2): S114-S123 (2014)On the analysis of the Zeus botnet crimeware toolkit., , , , , , and . PST, page 31-38. IEEE, (2010)Anomaly Detection Using Dynamic Time Warping., , , , , and . CSE/EUC, page 193-198. IEEE, (2019)Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat., , , , , , and . SECURWARE, page 195-200. IEEE Computer Society, (2010)