Author of the publication

Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions.

, , , and . Comput. Networks, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering., , , , , and . CoRR, (2019)Examining Adversarial Learning against Graph-based IoT Malware Detection Systems., , , , , , and . CoRR, (2019)Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications., , , and . EAI Endorsed Trans. Security Safety, 7 (23): e5 (2020)Breaking graph-based IoT malware detection systems using adversarial examples: poster., , , , , , and . WiSec, page 290-291. ACM, (2019)Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems., , , , , and . ICDCS, page 1296-1305. IEEE, (2019)Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection., , , , , and . ICICS, volume 12282 of Lecture Notes in Computer Science, page 443-461. Springer, (2020)A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet., , , and . IEEE/ACM Trans. Netw., 30 (1): 76-89 (2022)Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet., , , , , , , and . IEEE Access, (2020)Proactive detection of algorithmically generated malicious domains., , , and . ICOIN, page 21-24. IEEE, (2018)Investigating DNS Manipulation by Open DNS Resolvers., , and . CoNEXT Companion, page 45-46. ACM, (2019)