Author of the publication

A learning system for discriminating variants of malicious network traffic.

, , and . CSIIRW, page 23. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An information fusion framework for threat assessment., , and . FUSION, page 1903-1910. IEEE, (2009)An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications., , and . ICMLA (2), page 54-59. IEEE, (2013)978-0-7695-5144-9.AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors., , , , , , , , , and 4 other author(s). IEEE Big Data, page 1620-1629. IEEE, (2023)A Comparison of Software Quality Modeling Techniques., and . Software Engineering Research and Practice, page 263-266. CSREA Press, (2003)Modeling success in FLOSS project groups., , , and . PROMISE, page 16. ACM, (2009)A learning system for discriminating variants of malicious network traffic., , and . CSIIRW, page 23. ACM, (2013)Dimensionality reduction particle swarm algorithm for high dimensional clustering., , , and . SIS, page 1-6. IEEE, (2008)Matisse: A visual analytics system for exploring emotion trends in social media text streams., , , , and . IEEE BigData, page 807-814. IEEE Computer Society, (2015)The Swarm Model in Open Source Software Developer Communities., , , , , , and . SocialCom/PASSAT, page 656-660. IEEE Computer Society, (2010)An approach to the automated determination of host information value., , and . CICS, page 92-99. IEEE, (2011)