Author of the publication

CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification.

, , , , and . Comput. Networks, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification., , , , and . Comput. Networks, (2020)Optimization of RDMA-Based HDFS Data Distribution Mechanism., , , and . NPC, volume 12639 of Lecture Notes in Computer Science, page 251-262. Springer, (2020)Unveiling encrypted traffic types through hierarchical network characteristics., , , , , , and . Comput. Secur., (March 2024)E-DoH: Elegantly Detecting the Depths of Open DoH Service on the Internet., , , , , , , , and . CoRR, (2024)Energy and exergy analysis of poly-generation system of hydrogen and electricity via coal partial gasification., , , , , , and . Comput. Chem. Eng., (2020)CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection., , , , , , , , , and . Comput. Secur., (2023)An Approach for Scale Suspicious Network Events Detection., , , , , and . IEEE BigData, page 5854-5863. IEEE, (2019)C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement., , , , , and . Comput. Secur., (2023)BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement., , , , , , and . HPCC/DSS/SmartCity/DependSys, page 391-398. IEEE, (2021)