Author of the publication

Hide And Seek: Detecting Sensors In P2P Botnets

, , , , and . IEEE Conference on Communications and Network Security, page 731--732. (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introduction to the Special Section on Recent Advances in Networks and Distributed Systems., , , and . ACM Trans. Internet Techn., 22 (4): 93:1-93:3 (November 2022)BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets, , , , and . IEEE International Conference on Communications (ICC),, (2016)This Network is Infected : HosTaGe - a Low-Interaction Honeypot for Mobile Devices, , , , , , and . Security and Privacy in Smartphones & Mobile Devices, page 43--48. (2013)Towards Developing Resilient and Service-oriented Mission-critical Systems., , and . NetSoft, page 317-319. IEEE, (2023)Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring., , , and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 87-105. Springer, (2022)Distributed Bio-inspired Configuration of Virtualized Mission-critical Networks., , and . GLOBECOM, page 988-993. IEEE, (2022)Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs., , and . IPCCC, page 1-11. IEEE, (2019)Enhanced Performance and Privacy for TLS over TCP Fast Open., , , , and . Proc. Priv. Enhancing Technol., 2020 (2): 271-287 (2020)Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection., , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 248-262. Springer, (2020)Enhanced performance for the encrypted web through TLS resumption across hostnames., , , , and . ARES, page 16:1-16:10. ACM, (2020)