A method for classification of network traffic based on C5. 0 Machine Learning Algorithm T Bujlow, T Riaz, JM Pedersen 2012 international conference on computing, networking and communications …, 2012 | 199 | 2012 |
An efficient flow-based botnet detection using supervised machine learning M Stevanovic, JM Pedersen 2014 international conference on computing, networking and communications …, 2014 | 164 | 2014 |
An approach for detection and family classification of malware based on behavioral analysis SS Hansen, TMT Larsen, M Stevanovic, JM Pedersen 2016 International conference on computing, networking and communications …, 2016 | 151 | 2016 |
Analysis of malware behavior: Type classification using machine learning RS Pirscoveanu, SS Hansen, TMT Larsen, M Stevanovic, JM Pedersen, ... 2015 International conference on cyber situational awareness, data analytics …, 2015 | 149 | 2015 |
A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems A Patel, H Alhussian, JM Pedersen, B Bounabat, JC Júnior, S Katsikas Computers & Security 64, 92-109, 2017 | 81 | 2017 |
An analysis of network traffic classification for botnet detection M Stevanovic, JM Pedersen 2015 International Conference on Cyber Situational Awareness, Data Analytics …, 2015 | 65 | 2015 |
Machine learning for identifying botnet network traffic M Stevanovic, JM Pedersen | 60 | 2013 |
On the ground truth problem of malicious DNS traffic analysis M Stevanovic, JM Pedersen, A D'Alconzo, S Ruehrup, A Berger computers & security 55, 142-158, 2015 | 57 | 2015 |
An updated taxonomy for characterizing hackers according to their threat properties SLN Hald, JM Pedersen 2012 14th international conference on advanced communication technology …, 2012 | 54 | 2012 |
On the use of machine learning for identifying botnet network traffic M Stevanovic, JM Pedersen Journal of Cyber Security and Mobility 4 (2 & 3), 2016 | 45 | 2016 |
A method for identifying compromised clients based on DNS traffic analysis M Stevanovic, JM Pedersen, A D’Alconzo, S Ruehrup International Journal of Information Security 16, 115-132, 2017 | 39 | 2017 |
A novel methodology towards a trusted environment in mashup web applications A Patel, S Al-Janabi, I AlShourbaji, J Pedersen computers & security 49, 107-122, 2015 | 39 | 2015 |
Converged optical network and data center virtual infrastructure planning KN Georgakilas, A Tzanakaki, M Anastasopoulos, JM Pedersen Journal of Optical Communications and Networking 4 (9), 681-691, 2012 | 39 | 2012 |
SQoS as the base for next generation global infrastructure OB Madsen, TP Knudsen, JM Pedersen | 38 | 2003 |
Assessing measurements of QoS for global cloud computing services JM Pedersen, MT Riaz, JC Junior, B Dubalski, D Ledzinski, A Patel 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011 | 36 | 2011 |
Classification of HTTP traffic based on C5. 0 Machine Learning Algorithm T Bujlow, T Riaz, JM Pedersen 2012 IEEE Symposium on Computers and Communications (ISCC), 000882-000887, 2012 | 34 | 2012 |
Topological routing in large-scale networks JM Pedersen, TP Knudsen, OB Madsen The 6th International Conference on Advanced Communication Technology, 2004 …, 2004 | 33 | 2004 |
Bandwidth analysis of smart meter network infrastructure K Balachandran, RL Olsen, JM Pedersen 16th International Conference on Advanced Communication Technology, 928-933, 2014 | 32 | 2014 |
Strategies for the next generation green ICT infrastructure MT Riaz, JM Gutiérrez, JM Pedersen 2009 2nd international symposium on applied sciences in biomedical and …, 2009 | 32 | 2009 |
Open for hire: Attack trends and misconfiguration pitfalls of iot devices S Srinivasa, JM Pedersen, E Vasilomanolakis Proceedings of the 21st ACM Internet Measurement Conference, 195-215, 2021 | 31 | 2021 |