From post

Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.

, , , , , и . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, стр. 341-349. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Bayesian Decision Making to Detect Slow Scans., , , и . BADGERS@RAID, стр. 32-41. IEEE, (2015)A study on association rule mining of darknet big data., , , , , и . IJCNN, стр. 1-7. IEEE, (2015)An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers., , , , и . SAINT, стр. 257-260. IEEE Computer Society, (2010)Multipurpose Network Monitoring Platform Using Dynamic Address Assignment., , , и . AsiaJCIS, стр. 79-84. IEEE Computer Society, (2012)nicter: a large-scale network incident analysis system: case studies for understanding threat landscape., , , , , и . BADGERS@EuroSys, стр. 37-45. ACM, (2011)DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks., , , , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 381-382. Springer, (2009)A Methodology for Analyzing Overall Flow of Spam-Based Attacks., , , , , и . ICONIP (2), том 5864 из Lecture Notes in Computer Science, стр. 556-564. Springer, (2009)A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis., , , , и . ICONIP (2), том 5864 из Lecture Notes in Computer Science, стр. 565-572. Springer, (2009)A study on cost-effective P2P traffic classification., , , , и . IJCNN, стр. 1-7. IEEE, (2012)Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares., , , , и . DETER, USENIX Association, (2007)