Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Learning-based Encrypted Malware Traffic Classification with AutoML., , , , , and . ICCT, page 313-322. IEEE, (2021)Threat identification model for suspected Internet of Things attack groups., , , and . ICSS, page 283-288. IEEE, (2022)CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic., , , , , and . TrustCom, page 736-743. IEEE, (2020)An Illicit Bitcoin Address Analysis Scheme Based on Subgraph Evolution., , , and . HPCC/DSS/SmartCity/DependSys, page 679-686. IEEE, (2022)Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery., , and . DSA, page 152-160. IEEE, (2021)Using honeypots to model botnet attacks on the internet of medical things., , , , , and . Comput. Electr. Eng., (2022)On Smartly Scanning of the Internet of Things., , , , , , , , , and . IEEE/ACM Trans. Netw., 32 (2): 1019-1034 (April 2024)Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting., , , , , , and . IEEE/ACM Trans. Netw., 30 (1): 394-408 (2022)Far from classification algorithm: dive into the preprocessing stage in DGA detection., , , , , and . TrustCom, page 468-474. IEEE, (2020)Who is DNS serving for? A human-software perspective of modeling DNS services., , and . Knowl. Based Syst., (March 2023)