Author of the publication

A Behavior-Based Method for Distinguishing the Type of C&C Channel.

, , , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 624-636. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Historical document image segmentation using background light intensity normalization., and . DRR, volume 5676 of SPIE Proceedings, page 167-174. SPIE, (2005)Secondary classification using key features., , and . Document Recognition and Retrieval, volume 4307 of SPIE Proceedings, page 272-279. SPIE, (2001)RST-RF: A Hybrid Model based on Rough Set Theory and Random Forest for Network Intrusion Detection., , , , and . ICCSP, page 77-81. ACM, (2018)A chaincode based scheme for fingerprint feature extraction., and . Pattern Recognit. Lett., 27 (5): 462-468 (2006)Ethical Concerns of COVID-19 Contact Tracing: A Narrative Review., , , , , and . HCI (43), volume 1832 of Communications in Computer and Information Science, page 502-511. Springer, (2023)Adversarial Attack against LSTM-based DDoS Intrusion Detection System., , , and . ICTAI, page 686-693. IEEE, (2020)Comprehensive Behavior Profiling Model for Malware Classification., , , and . ISCC, page 129-135. IEEE, (2018)Removing Rule-Lines from Binary Handwritten Arabic Document Images Using Directional Local Profile., , and . ICPR, page 1916-1919. IEEE Computer Society, (2010)A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios., , , , , , and . TrustCom/BigDataSE, page 727-736. IEEE, (2018)Line removal and handwritten word recognition of police accident report forms., , , and . D.GO, volume 390 of ACM International Conference Proceeding Series, page 317-318. Digital Government Research Center, (2009)