From post

MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query.

, , , и . ICICS, том 11149 из Lecture Notes in Computer Science, стр. 685-695. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Effective In-vehicle Intrusion Detection via Multi-view Statistical Graph Learning on CAN Messages., , , , и . CoRR, (2023)Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic., , , , и . ICCNS, стр. 23-29. ACM, (2022)A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic., , , , и . ICT, стр. 1-5. IEEE, (2020)Text Detection in Natural Scene Images with Stroke Width Clustering and Superpixel., , , , и . PCM, том 8879 из Lecture Notes in Computer Science, стр. 123-132. Springer, (2014)DMNS: A Framework to Dynamically Monitor Simulated Network., , , , , и . ICPADS, стр. 192-199. IEEE Computer Society, (2016)UBSF: A novel online URL-Based Spam Filter., , , , , и . ISCC, стр. 332-339. IEEE Computer Society, (2008)Detecting Unknown DGAs Using Distances Between Feature Vectors of Domain Names., , , и . ICT, стр. 1-7. IEEE, (2021)FTPB: A Three-stage DNS Tunnel Detection Method Based on Character Feature Extraction., , и . TrustCom, стр. 250-258. IEEE, (2020)Toward Automatic Mobile Application Fingerprint Extraction from Non-encrypted HTTP Traffic., , , , , и . ISPA/BDCloud/SocialCom/SustainCom, стр. 353-362. IEEE, (2020)An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identification., , , , , и . CollaborateCom (2), том 461 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 214-230. Springer, (2022)