关注
Jens Myrup Pedersen
Jens Myrup Pedersen
在 es.aau.dk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A method for classification of network traffic based on C5. 0 Machine Learning Algorithm
T Bujlow, T Riaz, JM Pedersen
2012 international conference on computing, networking and communications …, 2012
1992012
An efficient flow-based botnet detection using supervised machine learning
M Stevanovic, JM Pedersen
2014 international conference on computing, networking and communications …, 2014
1642014
An approach for detection and family classification of malware based on behavioral analysis
SS Hansen, TMT Larsen, M Stevanovic, JM Pedersen
2016 International conference on computing, networking and communications …, 2016
1512016
Analysis of malware behavior: Type classification using machine learning
RS Pirscoveanu, SS Hansen, TMT Larsen, M Stevanovic, JM Pedersen, ...
2015 International conference on cyber situational awareness, data analytics …, 2015
1492015
A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems
A Patel, H Alhussian, JM Pedersen, B Bounabat, JC Júnior, S Katsikas
Computers & Security 64, 92-109, 2017
812017
An analysis of network traffic classification for botnet detection
M Stevanovic, JM Pedersen
2015 International Conference on Cyber Situational Awareness, Data Analytics …, 2015
652015
Machine learning for identifying botnet network traffic
M Stevanovic, JM Pedersen
602013
On the ground truth problem of malicious DNS traffic analysis
M Stevanovic, JM Pedersen, A D'Alconzo, S Ruehrup, A Berger
computers & security 55, 142-158, 2015
572015
An updated taxonomy for characterizing hackers according to their threat properties
SLN Hald, JM Pedersen
2012 14th international conference on advanced communication technology …, 2012
542012
On the use of machine learning for identifying botnet network traffic
M Stevanovic, JM Pedersen
Journal of Cyber Security and Mobility 4 (2 & 3), 2016
452016
A method for identifying compromised clients based on DNS traffic analysis
M Stevanovic, JM Pedersen, A D’Alconzo, S Ruehrup
International Journal of Information Security 16, 115-132, 2017
392017
A novel methodology towards a trusted environment in mashup web applications
A Patel, S Al-Janabi, I AlShourbaji, J Pedersen
computers & security 49, 107-122, 2015
392015
Converged optical network and data center virtual infrastructure planning
KN Georgakilas, A Tzanakaki, M Anastasopoulos, JM Pedersen
Journal of Optical Communications and Networking 4 (9), 681-691, 2012
392012
SQoS as the base for next generation global infrastructure
OB Madsen, TP Knudsen, JM Pedersen
382003
Assessing measurements of QoS for global cloud computing services
JM Pedersen, MT Riaz, JC Junior, B Dubalski, D Ledzinski, A Patel
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
362011
Classification of HTTP traffic based on C5. 0 Machine Learning Algorithm
T Bujlow, T Riaz, JM Pedersen
2012 IEEE Symposium on Computers and Communications (ISCC), 000882-000887, 2012
342012
Topological routing in large-scale networks
JM Pedersen, TP Knudsen, OB Madsen
The 6th International Conference on Advanced Communication Technology, 2004 …, 2004
332004
Bandwidth analysis of smart meter network infrastructure
K Balachandran, RL Olsen, JM Pedersen
16th International Conference on Advanced Communication Technology, 928-933, 2014
322014
Strategies for the next generation green ICT infrastructure
MT Riaz, JM Gutiérrez, JM Pedersen
2009 2nd international symposium on applied sciences in biomedical and …, 2009
322009
Open for hire: Attack trends and misconfiguration pitfalls of iot devices
S Srinivasa, JM Pedersen, E Vasilomanolakis
Proceedings of the 21st ACM Internet Measurement Conference, 195-215, 2021
312021
系统目前无法执行此操作,请稍后再试。
文章 1–20