Author of the publication

A method for detecting DGA botnet based on semantic and cluster analysis.

, and . SoICT, page 272-277. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EIFDD: An efficient approach for erasable itemset mining of very dense datasets., , , and . Appl. Intell., 43 (1): 85-94 (2015)Effective Computation Resilience in High Performance and Distributed Environments., , , , , and . Comput. Informatics, 35 (6): 1386-1415 (2016)OSSim: a generic simulation framework for overlay streaming., , and . SummerSim, page 30. Society for Computer Simulation International / ACM DL, (2013)Instance Segmentation under Occlusions via Location-aware Copy-Paste Data Augmentation., , , , and . CoRR, (2023)A heuristics approach to mine behavioural data logs in mobile malware detection system., , , and . Data Knowl. Eng., (2018)A New Approach for Mining Top-Rank-k Erasable Itemsets., , , and . ACIIDS (1), volume 8397 of Lecture Notes in Computer Science, page 73-82. Springer, (2014)SWAP: Protecting pull-based P2P video streaming systems from inference attacks., , , and . WoWMoM, page 1-9. IEEE Computer Society, (2016)Deep Learning for Proactive Network Monitoring and Security Protection., , , and . IEEE Access, (2020)Dynamic Node Embeddings From Edge Streams., , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 5 (6): 931-946 (2021)Enhancing service capability with multiple finite capacity server queues in cloud data centers., , and . Clust. Comput., 19 (4): 1747-1767 (2016)