Author of the publication

A Worm Behavioral Approach to Susceptible Host Detection.

, , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 77-83. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation., , , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 1-11. Springer, (2020)A proactive discovery and filtering solution on phishing websites., , , , and . IEEE BigData, page 2348-2355. IEEE Computer Society, (2015)A Worm Behavioral Approach to Susceptible Host Detection., , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 77-83. Springer, (2005)A novel approach for Web page modeling in personal information extraction., , , , , and . World Wide Web, 22 (2): 603-620 (2019)Biological entity relationship extraction method based on multiple kernel learning., , , and . BIBM, page 1669-1672. IEEE Computer Society, (2016)A Content Auditing Method of IPsec VPN., , , , and . DSC, page 634-639. IEEE, (2018)Research on Webpage Similarity Computing Technology Based on Visual Blocks., , , and . SMP, volume 489 of Communications in Computer and Information Science, page 187-197. Springer, (2014)A comprehensive analytical model of user influence in the social networks., , , and . Int. J. Wirel. Mob. Comput., 17 (2): 142-148 (2019)A novel classification model of collective user web behaviour based on network traffic contents., , , and . IET Networks, 10 (4): 173-184 (2021)Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle Network., , , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 1843-1854 (February 2023)