Author of the publication

Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic.

, , , , and . ICCNS, page 23-29. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling of Hierarchical Index System for Network Operation Security., and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 580-590. Springer, (2012)Effective In-vehicle Intrusion Detection via Multi-view Statistical Graph Learning on CAN Messages., , , , and . CoRR, (2023)Detecting Unknown DGAs Using Distances Between Feature Vectors of Domain Names., , , and . ICT, page 1-7. IEEE, (2021)Toward Automatic Mobile Application Fingerprint Extraction from Non-encrypted HTTP Traffic., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 353-362. IEEE, (2020)An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identification., , , , , and . CollaborateCom (2), volume 461 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 214-230. Springer, (2022)FTPB: A Three-stage DNS Tunnel Detection Method Based on Character Feature Extraction., , and . TrustCom, page 250-258. IEEE, (2020)Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic., , , , and . ICCNS, page 23-29. ACM, (2022)Incremental Learning for Mobile Encrypted Traffic Classification., , , , , and . ICC, page 1-6. IEEE, (2021)Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach., , , , and . ICNP, page 1-11. IEEE, (2019)Computer Vulnerability Evaluation Using Fault Tree Analysis., , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 302-313. Springer, (2005)