Author of the publication

Boosting the scalability of botnet detection using adaptive traffic sampling.

, , , , , and . AsiaCCS, page 124-134. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring and Preventing Supply Chain Attacks on Package Managers., , , , , and . CoRR, (2020)An assessment of VoIP covert channel threats., and . SecureComm, page 371-380. IEEE, (2007)RecProv: Towards Provenance-Aware User Space Record and Replay., , and . IPAW, volume 9672 of Lecture Notes in Computer Science, page 3-15. Springer, (2016)Simulating Internet Worms., , and . MASCOTS, page 268-274. IEEE Computer Society, (2004)An Extensible Environment for Evaluating Secure MANET., , and . SecureComm, page 339-352. IEEE, (2005)Comparative Study between Analytical Models and Packet-Level Worm Simulations., , and . PADS, page 88-98. IEEE Computer Society, (2005)Secure and Flexible Monitoring of Virtual Machines., and . ACSAC, page 385-397. IEEE Computer Society, (2007)Data Mining Approaches for Intrusion Detection., and . USENIX Security Symposium, USENIX Association, (1998)Using Artificial Anomalies to Detect Unknown and Known Network Intrusions., , , , and . ICDM, page 123-130. IEEE Computer Society, (2001)BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation., , , , and . USENIX Security Symposium, USENIX Association, (2007)