Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accurate in-network file-type classification., , and . SG-CRC, volume 14 of Cryptology and Information Security Series, page 139-146. IOS Press, (2016)A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification., and . SG-CRC, volume 15 of Cryptology and Information Security Series, page 57-69. IOS Press, (2017)Progressive Control Flow Obfuscation for Android Applications., , and . TENCON, page 1075-1079. IEEE, (2018)SLIC: Self-Learning Intelligent Classifier for network traffic., , , and . Comput. Networks, (2015)Opportunistic Piggyback Marking for IP Traceback., , , and . IEEE Trans. Inf. Forensics Secur., 11 (2): 273-288 (2016)A Novel Inequality-Based Fragmented File Carving Technique., and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 28-39. Springer, (2010)Securing Android: A Survey, Taxonomy, and Challenges., , , and . ACM Comput. Surv., 47 (4): 58:1-58:45 (2015)Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving., , and . CIS, page 793-797. IEEE Computer Society, (2011)Malicious Lateral Movement in 5G Core With Network Slicing And Its Detection., and . ITNAC, page 110-117. IEEE, (2023)A Generalized Links and Text Properties Based Forum Crawler., , and . Web Intelligence, page 113-120. IEEE Computer Society, (2012)