Author of the publication

A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Eigenspace Learning for Video-Based Face Recognition., , and . ICB, volume 4642 of Lecture Notes in Computer Science, page 181-190. Springer, (2007)Cross-Tier Interference-Aware Scheduling for Heterogeneous Uplink Transmission., , , and . VTC Fall, page 1-5. IEEE, (2014)MDDM: A Method to Improve Multiple Dimension Data Management Performance in HBase., , , , and . HPCC/CSS/ICESS, page 102-109. IEEE, (2015)A meta-modeling framework for a specific social domain: Public opinion event., , , , , and . Comput. Sci. Inf. Syst., 12 (2): 743-765 (2015)A Self-Adaptive QoS Guarantee Scheme for Multimedia Sensor Networks., , and . IJDSN, (2010)Switching Algorithm with Prediction Strategy for Maximizing Lifetime in Wireless Sensor Network., , , , and . IJDSN, (2015)Individual cylinder air-fuel ratio estimation and control for a large-bore gas fuel engine., , , , and . IJDSN, (2019)Interworking between WLANs and 3G networks: TCP challenges., , , , , and . WCNC, page 1252-1257. IEEE, (2004)Analysis for Localization-Oriented Coverage in Camera Sensor Networks., , and . WCNC, page 2579-2584. IEEE, (2008)A physarum-inspired algorithm for minimal exposure problem in wireless sensor networks., , and . WCNC, page 2151-2156. IEEE, (2012)