From post

A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration.

, , , и . NSS, том 11928 из Lecture Notes in Computer Science, стр. 520-535. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks., , , и . HPCS, стр. 676-678. IEEE, (2010)Action-Based Access Control for Web Services., , , и . IAS, стр. 637-642. IEEE Computer Society, (2009)On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems., , и . BWCCA, том 2 из Lecture Notes on Data Engineering and Communications Technologies, стр. 879-884. Springer, (2016)CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks., , и . ICC, стр. 1551-1555. IEEE, (2008)On Covert Communication with Interference Uncertainty., , , , и . ICC, стр. 1-6. IEEE, (2018)Towards Efficient Fully Randomized Message-Locked Encryption., , , , , и . ACISP (1), том 9722 из Lecture Notes in Computer Science, стр. 361-375. Springer, (2016)Research on the Resilience of Key Management in Sensor Networks., , и . CIS, стр. 716-720. IEEE Computer Society, (2007)Multi-hop Based Centrality of a Path in Complex Network., , , , и . CIS, стр. 292-296. IEEE Computer Society, (2017)Centrality Based Privacy Preserving for Weighted Social Networks., , , , и . CIS, стр. 574-577. IEEE Computer Society, (2017)Cheating Detection in (k, n) Secret Image Sharing Scheme., , и . IWDW, том 12022 из Lecture Notes in Computer Science, стр. 421-428. Springer, (2019)