From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Insights from the analysis of the Mariposa botnet., , , и . CRiSIS, стр. 1-9. IEEE Computer Society, (2010)A Practical Framework for the Dataflow Pointcut in AspectJ., , и . ARES, стр. 835-840. IEEE Computer Society, (2009)Investigating the dark cyberspace: Profiling, threat-based analysis and correlation., , , , , и . CRiSIS, стр. 1-8. IEEE Computer Society, (2012)Inferring Malware Family through Application Protocol Sequences Signature., , и . NTMS, стр. 1-5. IEEE, (2014)Towards Fingerprinting Malicious Traffic., , , и . ANT/SEIT, том 19 из Procedia Computer Science, стр. 548-555. Elsevier, (2013)AutoGuard: A Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G Networks., , , , , и . ESORICS (1), том 12972 из Lecture Notes in Computer Science, стр. 715-735. Springer, (2021)On the analysis of the Zeus botnet crimeware toolkit., , , , , , и . PST, стр. 31-38. IEEE, (2010)Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection., , , , , , , , и . IEEE Trans. Netw. Serv. Manag., 19 (1): 686-705 (2022)Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology., , , и . DBSec, том 10980 из Lecture Notes in Computer Science, стр. 312-329. Springer, (2018)Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective., , , , , и . DSN, стр. 562-573. IEEE Computer Society, (2018)