Author of the publication

Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection.

, , , , and . ICCS (2), volume 11537 of Lecture Notes in Computer Science, page 102-115. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach for Scale Suspicious Network Events Detection., , , , , and . IEEE BigData, page 5854-5863. IEEE, (2019)Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis., , , , , , , , and . SP, page 1197-1214. IEEE, (2021)State-of-the-Art: Security Competition in Talent Education., , , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 461-481. Springer, (2017)Attack Detection by Rough Set Theory in Recommendation System., , and . GrC, page 692-695. IEEE Computer Society, (2010)Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection., , , , , and . TrustCom/BigDataSE, page 744-753. IEEE, (2018)Malware classification for the cloud via semi-supervised transfer learning., , , , , and . J. Inf. Secur. Appl., (2020)BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement., , , , , , and . HPCC/DSS/SmartCity/DependSys, page 391-398. IEEE, (2021)BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment., , , , , , , and . SciSec, volume 13580 of Lecture Notes in Computer Science, page 421-436. Springer, (2022)Research on Identity Authentication Method Based on Negative Logic System., , , , and . CNCERT, volume 970 of Communications in Computer and Information Science, page 3-15. Springer, (2018)RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding., , , , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 155-170. Springer, (2020)