Author of the publication

CAS: Content Attribution System for Network Forensics.

, , , , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 129-136. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory chunking analysis of numerical password for Chinese websites., , , , and . MILCOM, page 788-793. IEEE, (2016)Improving Password Guessing Using Byte Pair Encoding., , , , , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 254-268. Springer, (2017)A Self-learning Rule-Based Approach for Sci-tech Compound Phrase Entity Recognition., , , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 732-743. Springer, (2015)The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract)., , , and . RAID, volume 7462 of Lecture Notes in Computer Science, page 376-377. Springer, (2012)Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services., , , , , and . IEEE Internet of Things Journal, 6 (2): 1584-1593 (2019)Efficient and Scalable Privacy-Preserving Similar Document Detection., , , , and . GLOBECOM, page 1-7. IEEE, (2017)Cloud-MOM: A Content-Based Real-Time Message-Oriented Middleware for Cloud., , , , and . HPCC/SmartCity/DSS, page 750-757. IEEE, (2018)An empirical analysis of family in the Tor network., , , and . ICC, page 1995-2000. IEEE, (2013)Towards an Analysis of Source-Rewriting Anonymous Systems in a Lossy Environment., , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 613-618. Springer, (2004)URM4DMU: An User Representation Model for Darknet Markets Users., , , , , , , and . ICASSP, page 1-5. IEEE, (2023)