Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RAT-based malicious activities detection on enterprise internal networks., , , , and . ICITST, page 321-325. IEEE, (2015)An Unsupervised Detection Approach for Location Attacks in Satellite-Based Navigation Data., , , , and . CCNC, page 991-992. IEEE, (2023)Analysis of Actual Propagation Behavior of WannaCry Within an Intranet (Extended Abstract)., , and . NBiS, volume 1036 of Advances in Intelligent Systems and Computing, page 557-559. Springer, (2019)High-Speed Forensic Technology Against Targeted Cyber Attacks (Extended Abstract)., , , , , and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 946. Springer, (2017)Novel Deception Techniques for Malware Detection on Industrial Control Systems., , , and . IACR Cryptology ePrint Archive, (2020)Anomalous IP Address Detection on Traffic Logs Using Novel Word Embedding., , , , , and . COMPSAC, page 1504-1509. IEEE, (2020)Novel Deception Techniques for Malware Detection on Industrial Control Systems., , , and . J. Inf. Process., (2021)TOPASE: Detection of brute force attacks used disciplined IPs from IDS log., , , , and . IM, page 1361-1364. IEEE, (2015)