Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DNS-based anti-evasion technique for botnets detection., , , , and . IDAACS, page 453-458. IEEE, (2015)Multi-agent Based Approach of Botnet Detection in Computer Systems., , and . CN, volume 291 of Communications in Computer and Information Science, page 171-180. Springer, (2012)A Technique for Detection of Bots Which Are Using Polymorphic Code., , , , and . CN, volume 431 of Communications in Computer and Information Science, page 265-276. Springer, (2014)Botnet detection technique for corporate area network., , , and . IDAACS, page 363-368. IEEE, (2013)Adaptive Information Technology of the Trojan' Detection in Computer Systems., and . Int. J. Comput., 10 (3): 259-269 (2011)The technique for computer systems Trojan diagnosis in the monitor mode., and . IDAACS (2), page 770-774. IEEE, (2011)978-1-4577-1426-9.