Author of the publication

On the use of Sub-Space Clustering & Evidence Accumulation for traffic analysis & classification.

, , and . IWCMC, page 1016-1021. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ML-based tunnel detection and tunneled application classification., , and . CoRR, (2022)0day Anomaly Detection Made Possible Thanks to Machine Learning, , and . Wired/Wireless Internet Communications, volume 6074 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 10.1007/978-3-642-13315-2_27.(2010)MINETRAC: Mining flows for unsupervised analysis & semi-supervised classification., , and . ITC, page 87-94. IEEE, (2011)On the use of Sub-Space Clustering & Evidence Accumulation for traffic analysis & classification., , and . IWCMC, page 1016-1021. IEEE, (2011)CNAME Cloaking-Based Tracking on the Web: Characterization, Detection, and Protection., , and . IEEE Trans. Netw. Serv. Manag., 18 (3): 3873-3888 (2021)Identifying and characterizing ZMap scans: a cryptanalytic approach., and . CoRR, (2019)Identifying Coordination of Network Scans Using Probed Address Structure., , and . TMA, IFIP, (2016)Anomalous Cluster Detection in Large Networks with Diffusion-Percolation Testing., , and . ESANN, (2021)Percolation-Based Detection of Anomalous Subgraphs in Complex Networks., , and . IDA, volume 12080 of Lecture Notes in Computer Science, page 287-299. Springer, (2020)Understanding abusive web resources: characteristics and counter-measures of malicious web resources and cryptocurrency mining., , and . AINTEC, page 54-61. ACM, (2018)