Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CAS: Content Attribution System for Network Forensics., , , , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 129-136. Springer, (2014)A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash., , , and . ICC, page 1-7. IEEE, (2019)Privacy-Preserving Content-Based Publish/Subscribe Service Based on Order Preserving Encryption., , , , and . IOV, volume 11894 of Lecture Notes in Computer Science, page 374-381. Springer, (2019)An automatic approach to extract the formats of network and security log messages., , , , and . MILCOM, page 1542-1547. IEEE, (2015)SFV-CNN: Deep Text Sentiment Classification with Scenario Feature Representation., , , , and . MACIS, volume 11989 of Lecture Notes in Computer Science, page 382-394. Springer, (2019)PrUE: Distilling Knowledge from Sparse Teacher Networks., , , and . ECML/PKDD (3), volume 13715 of Lecture Notes in Computer Science, page 102-117. Springer, (2022)Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications., , , , , and . DSC, page 91-98. IEEE, (2021)Mining Open-Source Cyber Threat Intelligence with Distant Supervision from the Web., , , and . DSC, page 76-82. IEEE, (2021)A Multi-Level Analysis Framework in Network Security Situation Awareness., , and . ITQM, volume 17 of Procedia Computer Science, page 530-536. Elsevier, (2013)A Bigram based Real Time DNS Tunnel Detection Approach., , , , and . ITQM, volume 17 of Procedia Computer Science, page 852-860. Elsevier, (2013)