Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Harvesting unique characteristics in packet sequences for effective application classification., , and . CNS, page 341-349. IEEE, (2013)Droid-Sec: deep learning in android malware detection., , , and . SIGCOMM, page 371-372. ACM, (2014)Spiral of silence in social networks: A data-driven approach., , , , , and . ASONAM, page 980-984. IEEE Computer Society, (2016)TMT: A new Tunable Mechanism of Tor based on the path length., , , and . CCIS, page 661-665. IEEE, (2012)A Combined Neural and Genetic Algorithm Model for Data Center Temperature Control., , , , and . CIMA@ICTAI, volume 2252 of CEUR Workshop Proceedings, page 58-69. CEUR-WS.org, (2018)Effective deployment of monitoring points on social networks., , , , , and . ICNC, page 62-66. IEEE Computer Society, (2015)TFD: A multi-pattern matching algorithm for large-scale URL filtering., , , and . ICNC, page 359-363. IEEE Computer Society, (2013)HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic., , , and . GLOBECOM, page 1-5. IEEE, (2010)Fast Hierarchical Cache Directory: A Scalable Cache Organization for Large-Scale CMP., , , , and . NAS, page 367-376. IEEE Computer Society, (2010)Optimizing multi-thread string matching for network processor based intrusion management system., , and . Communication, Network, and Information Security, page 199-204. IASTED/ACTA Press, (2006)