Author of the publication

A robust internet abuse detection method.

, , , and . BigData, page 1712-1715. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phishing detection based on newly registered domains., , , , and . BigData, page 3685-3692. IEEE Computer Society, (2016)Detecting DDoS Attack towards DNS Server Using a Neural Network Classifier., , , and . ICANN (3), volume 6354 of Lecture Notes in Computer Science, page 118-123. Springer, (2010)A New Statistical Approach to DNS Traffic Anomaly Detection., , , and . ADMA (2), volume 6441 of Lecture Notes in Computer Science, page 302-313. Springer, (2010)A Taxonomy of Hyperlink Hiding Techniques, , , , and . CoRR, (2013)In-Field Attack Proof of Injected False Data in Sensor Networks., , , and . JCM, 3 (6): 35-42 (2008)Modeling DNS Activities Based on Probabilistic Latent Semantic Analysis., , , and . ADMA (2), volume 6441 of Lecture Notes in Computer Science, page 290-301. Springer, (2010)RPKI Deployment: Risks and Alternative Solutions., , , , , and . ICGEC (1), volume 387 of Advances in Intelligent Systems and Computing, page 299-310. Springer, (2015)A Novel DMM Architecture Based on NDN., , , , and . QSHINE, volume 199 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 485-491. Springer, (2016)Dynamic proxy based distributed mobility management in PURSUIT., , , and . GLOBECOM Workshops, page 1024-1028. IEEE, (2013)Scaling the number of DNS root servers with Internet., , and . GLOBECOM Workshops, page 248-253. IEEE, (2014)