Author of the publication

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.

, , , , , , , , , and . ICDE, page 2705-2708. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved DV-Hop Algorithm Using Locally Weighted Linear Regression in Anisotropic Wireless Sensor Networks., , and . Wirel. Pers. Commun., 98 (4): 3335-3353 (2018)A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence., , , , , , , , , and . ICDE, page 2705-2708. IEEE, (2021)Hardware-Software Co-Design of Matrix-Solving for Non-Linear Optimization in SLAM Systems., , , , , and . IECON, page 1-8. IEEE, (2023)A Full Privacy-Preserving Scheme for Location-Based Services., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 596-601. Springer, (2014)NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation., , , , , , , , and . CoRR, (2023)Energy-Efficient Pose-Estimation FPGA-Accelerator for Real-Time Mobile V-SLAM Robot., , , , , , and . MWSCAS, page 566-570. IEEE, (2023)Spatial-temporal traffic performance collaborative forecast in urban road network based on dynamic factor model., , , , and . Expert Syst. Appl., (September 2023)Teaching Reform of Steel Structure Curriculum Basing on Study-Group Method and SPOC Platform., , , , and . ICEIT, page 5-9. IEEE, (2021)Modeling Curly Hair Based on Static Super-Helices., , , , and . CW, page 306-313. IEEE Computer Society, (2015)DISTDET: A Cost-Effective Distributed Cyber Threat Detection System., , , , , , , and . USENIX Security Symposium, page 6575-6592. USENIX Association, (2023)