Author of the publication

nicter: a large-scale network incident analysis system: case studies for understanding threat landscape.

, , , , , and . BADGERS@EuroSys, page 37-45. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Enhancing Credentials., , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 55-61. Springer, (2007)An autonomous online malicious spam email detection system using extended RBF network., , , , and . IJCNN, page 1-7. IEEE, (2015)Threshold Anonymous Group Identification and Zero-Knowledge Proof., , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 370-384. Springer, (2007)ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System., and . SEC, volume 147 of IFIP, page 177-192. Kluwer / Springer, (2004)Evolving cauchy possibilistic clustering and its application to large-scale cyberattack monitoring., , , , , and . SSCI, page 1-7. IEEE, (2017)Adaptive DDoS-Event Detection from Big Darknet Traffic Data., , , , , and . ICONIP (4), volume 9492 of Lecture Notes in Computer Science, page 376-383. Springer, (2015)A neural network model for detecting DDoS attacks using darknet traffic features., , , , and . IJCNN, page 2979-2985. IEEE, (2016)Large-Scale Monitoring for Cyber Attacks by Using Cluster Information on Darknet Traffic Features., , , , , and . INNS Conference on Big Data, volume 53 of Procedia Computer Science, page 175-182. Elsevier, (2015)nicter: a large-scale network incident analysis system: case studies for understanding threat landscape., , , , , and . BADGERS@EuroSys, page 37-45. ACM, (2011)Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets., , , , , and . AsiaJCIS, page 39-43. IEEE Computer Society, (2014)