Fingerprint The fingerprint is based on mining the text of the scientific documents related to the associated persons. Based on that an index of weighted terms is created, which defines the key subjects of research unit

Authentication Engineering & Materials Science
Access control Engineering & Materials Science
Cryptography Engineering & Materials Science
Internet Engineering & Materials Science
Communication Engineering & Materials Science
Classifiers Engineering & Materials Science
Servers Engineering & Materials Science
Telecommunication networks Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2006 2018

A domain is only as good as its buddies: Detecting stealthy malicious domains via graph inference

Khalil, I., Guan, B., Nabeel, M. & Yu, T., 13 Mar 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 330-341 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalability
Experiments

A survey on malicious domains detection through DNS data analysis

Zhauniarovich, Y., Khalil, I., Yu, T. & Dacier, M., 1 Jul 2018, In : ACM Computing Surveys. 51, 4, 3191329.

Research output: Contribution to journalArticle

Data analysis
Life cycle
Internet
Attack
Evaluation
1 Citations

Cross-platform data processing: Use cases and challenges

Kaoudi, Z. & Quiane Ruiz, J. A., 24 Oct 2018, Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1723-1726 4 p. 8509444

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tutorial
Ad hoc
Excel
End users
Zoo