Author of the publication

Port Scan Behavior Diagnosis by Clustering.

, , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 243-255. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RRM: An incentive reputation model for promoting good behaviors in distributed systems., , and . Science in China Series F: Information Sciences, 51 (11): 1871-1882 (2008)Analysis of Anonymity in P2P Anonymous Communication Systems., , , and . AINA Workshops, page 860-865. IEEE Computer Society, (2010)AMCAS: An Automatic Malicious Code Analysis System., , , , and . WAIM, page 501-507. IEEE, (2008)Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search., , , , , , , , , and 2 other author(s). IEEE Symposium on Security and Privacy, page 707-723. IEEE Computer Society, (2016)Analysis and Measurement of Zone Dependency in the Domain Name System., , , , and . ICC, page 1-7. IEEE, (2018)Cooperation-Based Trust Model and Its Application in Network Security Management., , and . ICA3PP (1), volume 7016 of Lecture Notes in Computer Science, page 453-459. Springer, (2011)Anonymous Communication over Invisible Mix Rings., , and . ICA3PP (1), volume 7016 of Lecture Notes in Computer Science, page 182-193. Springer, (2011)Host of Troubles: Multiple Host Ambiguities in HTTP Implementations., , , , , and . ACM Conference on Computer and Communications Security, page 1516-1527. ACM, (2016)Port Scan Behavior Diagnosis by Clustering., , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 243-255. Springer, (2005)An Extensible AAA Infrastructure for IPv6., , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 482-487. Springer, (2005)