Jens Myrup Pedersen
Jens Myrup Pedersen
es.aau.dk üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
A method for classification of network traffic based on C5. 0 Machine Learning Algorithm
T Bujlow, T Riaz, JM Pedersen
2012 international conference on computing, networking and communications …, 2012
1382012
An efficient flow-based botnet detection using supervised machine learning
M Stevanovic, JM Pedersen
2014 international conference on computing, networking and communications …, 2014
962014
Analysis of malware behavior: Type classification using machine learning
RS Pirscoveanu, SS Hansen, TMT Larsen, M Stevanovic, JM Pedersen, ...
2015 International conference on cyber situational awareness, data analytics …, 2015
742015
Machine learning for identifying botnet network traffic
M Stevanovic, JM Pedersen
Aalborg University, 2013
71*2013
An approach for detection and family classification of malware based on behavioral analysis
SS Hansen, TMT Larsen, M Stevanovic, JM Pedersen
2016 International conference on computing, networking and communications …, 2016
622016
Intelligent monitoring, control, and security of critical infrastructure systems
E Kyriakides, M Polycarpou
Springer, 2014
502014
Converged optical network and data center virtual infrastructure planning
KN Georgakilas, A Tzanakaki, M Anastasopoulos, JM Pedersen
Journal of Optical Communications and Networking 4 (9), 681-691, 2012
372012
A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems
A Patel, H Alhussian, JM Pedersen, B Bounabat, JC Júnior, S Katsikas
Computers & Security 64, 92-109, 2017
362017
SQoS as the base for next generation global infrastructure
OB Madsen, TP Knudsen, JM Pedersen
Aalborg University, Department of Control Engineering, 2003
362003
An analysis of network traffic classification for botnet detection
M Stevanovic, JM Pedersen
2015 International Conference on Cyber Situational Awareness, Data Analytics …, 2015
342015
On the ground truth problem of malicious DNS traffic analysis
M Stevanovic, JM Pedersen, A D'Alconzo, S Ruehrup, A Berger
computers & security 55, 142-158, 2015
322015
An updated taxonomy for characterizing hackers according to their threat properties
SLN Hald, JM Pedersen
2012 14th International Conference on Advanced Communication Technology …, 2012
322012
A novel methodology towards a trusted environment in mashup web applications
A Patel, S Al-Janabi, I AlShourbaji, J Pedersen
computers & security 49, 107-122, 2015
312015
Assessing measurements of QoS for global cloud computing services
JM Pedersen, MT Riaz, JC Junior, B Dubalski, D Ledzinski, A Patel
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
302011
Topological routing in large-scale networks
JM Pedersen, TP Knudsen, OB Madsen
The 6th International Conference on Advanced Communication Technology, 2004 …, 2004
302004
Classification of HTTP traffic based on C5. 0 Machine Learning Algorithm
T Bujlow, T Riaz, JM Pedersen
2012 IEEE Symposium on Computers and Communications (ISCC), 000882-000887, 2012
282012
Strategies for the next generation green ICT infrastructure
MT Riaz, JM Gutiérrez, JM Pedersen
2009 2nd International Symposium on Applied Sciences in Biomedical and …, 2009
282009
A method for identifying compromised clients based on DNS traffic analysis
M Stevanovic, JM Pedersen, A D’Alconzo, S Ruehrup
International Journal of Information Security 16 (2), 115-132, 2017
242017
Reliability of Single, Double and N2R Ring Network Structures.
T Jørgensen, L Pedersen, JM Pedersen
Communications in Computing, 189-195, 2005
242005
Applying 4-regular grid structures in large-scale access networks
JM Pedersen, A Patel, TP Knudsen, OB Madsen
Computer communications 29 (9), 1350-1362, 2006
232006
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20