Author of the publication

CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification.

, , , , and . Comput. Networks, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

State-of-the-Art: Security Competition in Talent Education., , , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 461-481. Springer, (2017)Attack Detection by Rough Set Theory in Recommendation System., , and . GrC, page 692-695. IEEE Computer Society, (2010)An Approach for Scale Suspicious Network Events Detection., , , , , and . IEEE BigData, page 5854-5863. IEEE, (2019)Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis., , , , , , , , and . SP, page 1197-1214. IEEE, (2021)Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection., , , , , and . TrustCom/BigDataSE, page 744-753. IEEE, (2018)Modx: Binary Level Partial Imported Third-Party Library Detection through Program Modularization and Semantic Matching., , , , , and . CoRR, (2022)THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection., , , , and . J. Supercomput., 76 (9): 7489-7518 (2020)New Security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications., , , , , and . SciSec, volume 11287 of Lecture Notes in Computer Science, page 172-180. Springer, (2018)Malware classification for the cloud via semi-supervised transfer learning., , , , , and . J. Inf. Secur. Appl., (2020)NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices., , , , , , , , and . Cybersecur., 5 (1): 21 (2022)