Author of the publication

Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets.

, , , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 53-68. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards an Analysis of Source-Rewriting Anonymous Systems in a Lossy Environment., , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 613-618. Springer, (2004)Evicting and filling attack for linking multiple network addresses of Bitcoin nodes., , , , , , and . Cybersecur., 6 (1): 50 (December 2023)Relation Extraction based on Data Partition and Representation Integration., , , , , and . DSC, page 68-75. IEEE, (2021)Memory chunking analysis of numerical password for Chinese websites., , , , and . MILCOM, page 788-793. IEEE, (2016)Improving Password Guessing Using Byte Pair Encoding., , , , , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 254-268. Springer, (2017)Cloud-MOM: A Content-Based Real-Time Message-Oriented Middleware for Cloud., , , , and . HPCC/SmartCity/DSS, page 750-757. IEEE, (2018)Efficient and Scalable Privacy-Preserving Similar Document Detection., , , , and . GLOBECOM, page 1-7. IEEE, (2017)An empirical analysis of family in the Tor network., , , and . ICC, page 1995-2000. IEEE, (2013)URM4DMU: An User Representation Model for Darknet Markets Users., , , , , , , and . ICASSP, page 1-5. IEEE, (2023)A Self-learning Rule-Based Approach for Sci-tech Compound Phrase Entity Recognition., , , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 732-743. Springer, (2015)