Filter your results
- 9
- 9
- 9
- 3
- 1
- 1
- 1
- 2
- 2
- 2
- 9
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Aggregation of Network Protocol Data Near Its Source2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.482-491, ⟨10.1007/978-3-642-55032-4_49⟩
Conference papers
hal-01397258v1
|
||
|
Detection of Bitcoin-Based Botnets Using a One-Class Classifier12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.174-189, ⟨10.1007/978-3-030-20074-9_13⟩
Conference papers
hal-02294596v1
|
||
|
Netflow-Based Malware Detection and Data Visualisation System16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.652-660, ⟨10.1007/978-3-319-59105-6_56⟩
Conference papers
hal-01656262v1
|
||
|
Characterisation of the Kelihos.B Botnet8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.79-91, ⟨10.1007/978-3-662-43862-6_11⟩
Conference papers
hal-01401294v1
|
||
|
How to Achieve Early Botnet Detection at the Provider Level?10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.142-146, ⟨10.1007/978-3-319-39814-3_15⟩
Conference papers
hal-01632750v1
|
||
|
How Current Android Malware Seeks to Evade Automated Code Analysis9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers
hal-01442542v1
|
||
|
How Dangerous Is Internet Scanning?7th Workshop on Traffic Monitoring and Analysis (TMA), Apr 2015, Barcelona, Spain. pp.158-172, ⟨10.1007/978-3-319-17172-2_11⟩
Conference papers
hal-01411192v1
|
||
|
HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.38-48, ⟨10.1007/978-3-642-30955-7_5⟩
Conference papers
hal-01534315v1
|
||
|
A Collaborative Approach to Botnet ProtectionInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.624-638, ⟨10.1007/978-3-642-32498-7_47⟩
Conference papers
hal-01542425v1
|