Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Association Rule-Based Method to Detect and Classify Botnets., , , and . Secur. Commun. Networks, (2021)An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning., , , , , and . Secur. Commun. Networks, (2019)Integrating Traffics with Network Device Logs for Anomaly Detection., , , , , , and . Secur. Commun. Networks, (2019)Anti-Attack Intrusion Detection Model Based on MPNN and Traffic Spatiotemporal Characteristics., , , , and . J. Grid Comput., 21 (4): 60 (December 2023)Moving target defense controller of mobile system based on Openflow sensor security scheme., and . Comput. Commun., (2020)Transaction-based classification and detection approach for Ethereum smart contract., , , , , , , , and . Inf. Process. Manag., 58 (2): 102462 (2021)具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate)., , , , and . 计算机科学, 45 (7): 135-138 (2018)Botnet Detection based on Fuzzy Association Rules., , , , and . ICPR, page 578-584. IEEE Computer Society, (2018)A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm., , , , , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 268-284. Springer, (2020)Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus., , , , and . Int. J. Pattern Recognit. Artif. Intell., 33 (14): 1955015:1-1955015:15 (2019)