Author of the publication

Detecting compromised email accounts via login behavior characterization.

, , , , , , and . Cybersecur., 6 (1): 36 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enterprise LST Algorithm Development and Its Evaluation with NOAA 20 Data., , , , and . Remote. Sens., 11 (17): 2003 (2019)Natural Language Information Hiding Based on Chinese Mathematical Expression., , , and . Int. J. Netw. Secur., 8 (1): 10-15 (2009)Ten Years of VIIRS Land Surface Temperature Product Validation., , , , and . Remote. Sens., 14 (12): 2863 (2022)A parameter-free approach to lossless summarization of fully dynamic graphs., , , , and . Inf. Sci., (2022)CNN-BiLSTM-Attention: A multi-label neural classifier for short texts with a small set of labels., , , and . Inf. Process. Manag., 60 (3): 103320 (May 2023)Confusing-Keyword Based Secure Search over Encrypted Cloud Data., , , , and . Mob. Networks Appl., 25 (1): 125-132 (2020)Quantitative Method for Network Security Situation Based on Attack Prediction., , , and . Secur. Commun. Networks, (2017)C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement., , , , , and . Comput. Secur., (2023)Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model., , , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 44-59. Springer, (2013)An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector., , , , and . Secur. Commun. Networks, (2021)