Personensuche
X
?
Proceedings of the ACM on Web Conference 2024 ,
1
Fingerprinting the Shadows: Unmasking Malicious Servers wit..:
, In:
?
2023 IEEE Symposium on Computers and Communications (ISCC) ,
2
Pump Up the JARM: Studying the Evolution of Botnets Using A..:
, In:
?
2023 International Conference on Engineering and Emerging Technologies (ICEET) ,
3
A Reconfigurable IDS Framework for Encrypted and Non-Encryp..:
, In:
?
2022 IEEE Conference on Dependable and Secure Computing (DSC) ,
5
Network Intrusion Detection in Encrypted Traffic:
, In:
?
Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy ,
10
TrustAV : Practical and Privacy Preserving Malware Analy..:
, In:
?
2020 6th IEEE Conference on Network Softwarization (NetSoft) ,
11
Pythia: Scheduling of Concurrent Network Packet Processing ..:
, In:
?
Computer Security; Lecture Notes in Computer Science ,
12
CyberSure: A Framework for Liability Based Trust:
, In:
?
2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) ,
13
Head(er)Hunter: Fast Intrusion Detection using Packet Metad..:
, In:
?
Research in Attacks, Intrusions, and Defenses; Lecture Notes in Computer Science ,
14