Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Operating System Classification: A Minimalist Approach., , , and . ICMLC, page 143-150. IEEE, (2020)Detecting Botnet Victims Through Graph-Based Machine Learning., , , , and . ICMLC, page 1-6. IEEE, (2021)Clustering Network-Connected Devices Using Affiliation Graphs., , , and . ICMLC, page 1-7. IEEE, (2021)Task adaptive siamese neural networks for open-set recognition of encrypted network traffic with bidirectional dropout., , , , , , , , and . Pattern Recognit. Lett., (2022)Distilling command and control network intrusions from network flow metadata using temporal PageRank., and . ITNAC, page 107-114. IEEE Computer Society, (2016)Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic., , , , , , , and . NCA, page 1-8. IEEE, (2018)Characterising Network-Connected Devices Using Affiliation Graphs., , , and . NOMS, page 1-6. IEEE, (2020)Using Scan-Statistical Correlations for Network Change Analysis., and . PAKDD Workshops, volume 7867 of Lecture Notes in Computer Science, page 1-13. Springer, (2013)Exploiting graph compression techniques for coding and monitoring of networks., and . ICC, page 1173-1178. IEEE, (2014)Coverage Measurement for Software Application Testing using Partially Ordered Domains and Symbolic Trajectory Evaluation Techniques., , and . DELTA, page 481-487. IEEE Computer Society, (2006)