Author of the publication

Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis.

, , , and . IEEE/ACM Trans. Netw., 20 (5): 1663-1677 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High performance distributed Denial-of-Service resilient web cluster architecture., and . NOMS, page 1019-1024. IEEE, (2008)Measuring serendipity: connecting people, locations and interests in a mobile 3G network., , , and . Internet Measurement Conference, page 267-279. ACM, (2009)Detecting algorithmically generated malicious domain names., , , and . Internet Measurement Conference, page 48-61. ACM, (2010)DoWitcher: Effective Worm Detection and Containment in the Internet Core., , , , , and . INFOCOM, page 2541-2545. IEEE, (2007)Taming the Mobile Data Deluge With Drop Zones., , , and . IEEE/ACM Trans. Netw., 20 (4): 1010-1023 (2012)High-Performance Resource Allocation and Request Redirection Algorithms for Web Clusters., and . IEEE Trans. Parallel Distrib. Syst., 19 (9): 1186-1200 (2008)Detecting bots via incremental LS-SVM learning with dynamic feature adaptation., , and . KDD, page 386-394. ACM, (2011)DDoS-shield: DDoS-resilient scheduling to counter application layer attacks., , , , and . IEEE/ACM Trans. Netw., 17 (1): 26-39 (2009)A Social Network Based Patching Scheme for Worm Containment in Cellular Networks., , , , and . INFOCOM, page 1476-1484. IEEE, (2009)Wide Area Redirection of Dynamic Content by Internet Data Centers., , and . INFOCOM, IEEE, (2004)