Author of the publication

An empirical study of morphing on behavior-based network traffic classification.

, , , and . Security and Communication Networks, 8 (1): 68-79 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Adaptive Timeout Strategy for UDP Flows Using SVMs., , , and . PDCAT, page 118-127. IEEE Computer Society, (2010)Biprominer: Automatic Mining of Binary Protocol Features., , , , , and . PDCAT, page 179-184. IEEE Computer Society, (2011)A New Redshift Indicator of Gamma-Ray Bursts to Measure the Cosmos.. Data Science Journal, (2007)Load Balancing for Flow-Based Parallel Processing Systems in CMP Architecture., , , and . GLOBECOM, page 1-7. IEEE, (2009)Rethinking the Building Block: A Profiling Methodology for UDP Flows., , , and . GCC, page 332-337. IEEE Computer Society, (2010)Toward Unsupervised Protocol Feature Word Extraction., , , , and . IEEE Journal on Selected Areas in Communications, 32 (10): 1894-1906 (2014)An empirical study of morphing on behavior-based network traffic classification., , , and . Security and Communication Networks, 8 (1): 68-79 (2015)A Trace-Driven Simulation Study of Load Balancing on Distributed NIDS., , and . NAS, page 159-160. IEEE Computer Society, (2008)Kaleido: An Efficient Out-of-core Graph Mining System on A Single Machine., , , , and . CoRR, (2019)Traffic classification beyond application level: identifying content types from network traces., , and . SAC, page 540-541. ACM, (2011)