Author of the publication

A Markov Random Field Approach to Automated Protocol Signature Inference.

, , , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 459-476. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Caching Based on Matching Game in LEO Satellite Constellation Networks., , , , and . IEEE Communications Letters, 22 (2): 300-303 (2018)Curvature-Constrained UAV Path Planning in Tracking a Moving Air Target., , , , , and . ICCA, page 582-587. IEEE, (2018)An adaptive variational finite difference framework for efficient symmetric octree viscosity., , , and . ACM Trans. Graph., 38 (4): 94:1-94:14 (2019)A Comprehensive Measurement Study of Domain-Squatting Abuse., , , , and . ICC, page 1-6. IEEE, (2019)A 41-mW 30-Gb/s CMOS optical receiver with digitally-tunable cascaded equalization., , , , , , , and . ESSCIRC, page 127-130. IEEE, (2014)A 25-Gb/s 32.1-dB CMOS limiting amplifier for integrated optical receivers., , , and . ASICON, page 1-4. IEEE, (2013)Accurate Cloning of the Memory Access Behavior., , , and . IPSJ Trans. System LSI Design Methodology, (2016)Performance evaluation of Xunlei peer-to-peer network: A measurement study., , , , and . CCNC, page 257-261. IEEE, (2011)Perspective Scene Text Recognition with Feature Compression and Ranking., , , , and . ACCV Workshops (2), volume 9009 of Lecture Notes in Computer Science, page 181-195. Springer, (2014)An Efficient Marginal-Return-Based Constructive Heuristic to Solve the Sensor-Weapon-Target Assignment Problem., , and . IEEE Trans. Systems, Man, and Cybernetics: Systems, 49 (12): 2536-2547 (2019)