Author of the publication

Eliminating Steganography in Internet Traffic with Active Wardens.

, , , and . Information Hiding, volume 2578 of Lecture Notes in Computer Science, page 18-35. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack chain detection., , and . Statistical Analysis and Data Mining, 8 (5-6): 353-363 (2015)Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback., , , , , , and . ICASSP, page 2872-2876. IEEE, (2019)Eliminating Steganography in Internet Traffic with Active Wardens., , , and . Information Hiding, volume 2578 of Lecture Notes in Computer Science, page 18-35. Springer, (2002)Anomaly Detection in Large Scale Networks with Latent Space Models., , , and . CoRR, (2019)Improving antivirus accuracy with hypervisor assisted analysis., , and . Journal in Computer Virology, 7 (2): 121-131 (2011)Graph-based malware detection using dynamic analysis., , , , and . Journal in Computer Virology, 7 (4): 247-258 (2011)Connected Components and Credential Hopping in Authentication Graphs., , , and . SITIS, page 416-423. IEEE Computer Society, (2014)Detecting Localised Anomalous Behaviour in a Computer Network., , and . IDA, volume 8819 of Lecture Notes in Computer Science, page 321-332. Springer, (2014)Web Adoption: An Attempt Toward Classifying Risky Internet Web Browsing Behavior., , and . LASER, page 25-36. USENIX Association, (2013)A Likelihood Ratio Detector for Identifying Within-Perimeter Computer Network Attacks., , , , , and . CoRR, (2016)