Author of the publication

Scalable analytics to detect DNS misuse for establishing stealthy communication channels.

, , , , , , and . IBM J. Res. Dev., 60 (4): 3 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic., , , , , , and . DSN, page 76-87. IEEE, (2020)Scalable malware classification with multifaceted content features and threat intelligence., , , , , and . IBM J. Res. Dev., 60 (4): 6 (2016)IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)Traffic Anomaly Detection and Diagnosis on the Network Flow Level.. EPFL, Switzerland, (2011)FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics., , , , , and . ICDE, page 1316-1327. IEEE Computer Society, (2015)Dressed up: Baiting Attackers through Endpoint Service Projection., , , and . SDN-NFV@CODASPY, page 23-28. ACM, (2018)MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation., , , , , and . EURASIP J. Information Security, (2014)Stream computing for large-scale, multi-channel cyber threat analytics., , , , , , , , and . IRI, page 8-15. IEEE Computer Society, (2014)Threat Intelligence Computing., , , , , , and . ACM Conference on Computer and Communications Security, page 1883-1898. ACM, (2018)Security 360°: Enterprise security for the cognitive era., , , , , , and . IBM J. Res. Dev., 60 (4): 1 (2016)