Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EC-Model: An Evolvable Malware Classification Model., , , , , and . DSC, page 1-8. IEEE, (2021)Semi-supervised Learning for False Alarm Reduction., , , , and . ICDM, volume 6171 of Lecture Notes in Computer Science, page 595-605. Springer, (2010)Discovering Potential Victims Within Enterprise Network via Link Analysis Method., , , and . IEA/AIE, volume 9101 of Lecture Notes in Computer Science, page 326-335. Springer, (2015)DT-Track: Using DNS-Timing Side Channel for Mobile User Tracking., , , , , and . DSC, page 1-8. IEEE, (2019)A practical Chinese wall security model in cloud computing., , , , and . APNOMS, page 1-4. IEEE, (2011)False Alert Buster: an Adaptive Approach for NIDS False Alert Filtering., , and . ICCBD, page 58-62. ACM, (2019)Top of the Pops: A Novel Whitelist Generation Scheme for Data Exfiltration Detection., , , and . SAI (2), volume 284 of Lecture Notes in Networks and Systems, page 65-79. Springer, (2021)MD-Miner: Behavior-Based Tracking of Network Traffic for Malware-Control Domain Detection., , , , and . BigDataService, page 96-105. IEEE Computer Society, (2017)