Author of the publication

Identifying compromised hosts under APT using DNS request sequences.

, , , and . J. Parallel Distributed Comput., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PyIO: Input-Output Analysis with Python, , , and . Urban/Regional, EconWPA, (2004)Scalable Temporal Latent Space Inference for Link Prediction in Dynamic Social Networks., , , , and . IEEE Trans. Knowl. Data Eng., 28 (10): 2765-2777 (2016)Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection., , , and . IJDSN, (2015)Reg: An Ultra-Lightweight Container That Maximizes Memory Sharing and Minimizes the Runtime Environment., , , , , and . ICWS, page 76-82. IEEE, (2019)Bayesian network loss inference., and . ICASSP (6), page 33-36. IEEE, (2003)AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats., , , and . Sensors, 19 (14): 3180 (2019)Wavelet-based sequential Monte Carlo blind receivers in fading channels with unknown channel statistics., , and . IEEE Trans. Signal Process., 52 (1): 227-239 (2004)Dynamic sensor collaboration via sequential Monte Carlo., and . IEEE J. Sel. Areas Commun., 22 (6): 1037-1047 (2004)Outlier Detection and Correction for Monitoring Data of Water Quality Based on Improved VMD and LSSVM., , , , , , and . Complex., (2019)Joint multiple target tracking and classification in collaborative sensor networks., , and . ISIT, page 552. IEEE, (2004)