Author of the publication

Malicious Domain Detection Based on K-means and SMOTE.

, , , , , and . ICCS (2), volume 12138 of Lecture Notes in Computer Science, page 468-481. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DGGCN: Dictionary based DGA detection method based on DomainGraph and GCN., , , , , , and . ICCCN, page 1-10. IEEE, (2022)A Power Analysis on SMS4 Using the Chosen Plaintext Method., , , , , and . CIS, page 748-752. IEEE Computer Society, (2013)Deep Dive into Insider Threats: Malicious Activity Detection within Enterprise., , , , , , and . CSCWD, page 1578-1584. IEEE, (2024)Malicious Domain Detection Based on K-means and SMOTE., , , , , and . ICCS (2), volume 12138 of Lecture Notes in Computer Science, page 468-481. Springer, (2020)Practical Partial-Nonce-Exposure Attack on ECC Algorithm., , , , , , , , and . CIS, page 248-252. IEEE Computer Society, (2017)Correlation Power Analysis Against Stream Cipher MICKEY v2., , and . CIS, page 320-324. IEEE Computer Society, (2010)A Fast Gradient Boosting Based Approach for Predicting Frags in Tactic Games., , , , , and . ICME Workshops, page 6-10. IEEE, (2023)Multisensor Acquirement System of Electrokinetic in Multiphase Flow., , , and . J. Networks, 8 (9): 1975-1981 (2013)Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?, , , , , , , and . CARDIS, volume 10728 of Lecture Notes in Computer Science, page 232-247. Springer, (2017)Evaluation and Improvement of Generic-Emulating DPA Attacks., , , , , , , and . IACR Cryptol. ePrint Arch., (2016)