Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cause-Based Classification Approach for Malicious DNS Queries Detected Through Blacklists., , , , and . IEEE Access, (2019)Sharing information for event analysis over the wide Internet., , , , and . J. Commun. Networks, 12 (4): 382-394 (2010)Analysis of image quality of digital panoramic tomography using "PANOURA 15 DIGIPAN"., , , and . CARS, volume 1230 of International Congress Series, page 1289-1290. Elsevier, (2001)Unknown Malicious Domain Detection based on DNS Query Analysis using Word2Vec., , , , and . CSCI, page 1096-1097. IEEE, (2022)Identifying User Authentication Methods on Connections for SSH Dictionary Attack Detection., , and . COMPSAC Workshops, page 593-598. IEEE Computer Society, (2013)A Superficial Analysis Approach for Identifying Malicious Domain Names Generated by DGA Malware., , , and . IEEE Open J. Commun. Soc., (2020)A flow-based detection method for stealthy dictionary attacks against Secure Shell., , and . J. Inf. Secur. Appl., (2015)A New Approach to Identify User Authentication Methods toward SSH Dictionary Attack Detection., , and . IEICE Trans. Inf. Syst., 98-D (4): 760-768 (2015)Characterizing the basic performance of IEEE 802.11ax using actual hardware measurements., , , , and . NOMS, page 1-4. IEEE, (2022)Knowledge Oriented Network Fault Resolution Method Based on Active Information Resource., , , , , , , , and . IAT, page 361-364. IEEE Computer Society Press, (2010)978-0-7695-4191-4.