Author of the publication

Alchemy: Stochastic Feature Regeneration for Malicious Network Traffic Classification.

, , , , , , , , and . COMPSAC (1), page 346-351. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malicious Host Detection by Imaging SYN Packets and A Neural Network., , , , and . ISNCC, page 1-4. IEEE, (2018)Proposal of Collaboration Safety in a Coexistence Environment of Human and Robots., , , , and . ICRA, page 1924-1930. IEEE, (2018)MATATABI: Multi-layer Threat Analysis Platform with Hadoop., , , and . BADGERS@ESORICS, page 75-82. IEEE, (2014)Device-Based Network Selection for Edge Computing., , , , and . CCNC, page 1-2. IEEE, (2019)Geometric registration for zoomable camera using epipolar constraint and pre-calibrated intrinsic camera parameter change., , , , and . ISMAR, page 295-296. IEEE Computer Society, (2013)Design of Geographically Aggregatable Address and Routing Toward Location Based Multicast., , and . AINA Workshops, page 1307-1312. IEEE Computer Society, (2013)Oblivious DDoS mitigation with locator/ID separation protocol., , and . CFI, page 8:1-8:6. ACM, (2014)Investigating the Impact of Network Metrics on Multi-path Transport., , , and . AINTEC, page 46-53. ACM, (2023)Distributed Hayabusa: Scalable Syslog Search Engine Optimized for Time-Dimensional Search., , , , , , , and . AINTEC, page 9-16. ACM, (2019)A Trusted Knowledge Management System for Multi-layer Threat Analysis., , , , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 214-215. Springer, (2014)