Cited By
View all- Moure-Garrido MCampo CGarcia-Rubio CIgartua Mde la Cruz Llopis LBegin T(2022)Detecting Malicious Use of DoH Tunnels Using Statistical Traffic AnalysisProceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks10.1145/3551663.3558605(25-32)Online publication date: 24-Oct-2022
- Joback Shing Alperin KGomez Jorgensen Elkin (2020)A Statistical Approach to Detecting Low-Throughput Exfiltration through the Domain Name System ProtocolProceedings of the 2020 Workshop on DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security10.1145/3477997.3478007(1-10)Online publication date: 7-Dec-2020
- De SBarik MBanerjee IHansdah RKrishnaswamy DVaidya N(2019)A percolation-based recovery mechanism for bot infected P2P cloudProceedings of the 20th International Conference on Distributed Computing and Networking10.1145/3288599.3295597(474-479)Online publication date: 4-Jan-2019
- Show More Cited By