Folgen
Radu State
Titel
Zitiert von
Zitiert von
Jahr
The Challenge of Non-Technical Loss Detection Using Artificial Intelligence: A Survey
FB Patrick Glauner, Jorge Augusto Meira, Petko Valtchev, Radu State
International Journal of Computational Intelligence Systems 10 (1), 760-775, 2017
191*2017
Osiris: Hunting for integer bugs in ethereum smart contracts
F Torres, Christof, J Schütte, R State
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
1652018
PhishStorm: Detecting phishing with streaming analytics
S Marchal, J François, R State, T Engel
IEEE Transactions on Network and Service Management 11 (4), 458-471, 2014
1562014
BotTrack: tracking botnets using NetFlow and PageRank
J François, S Wang, R State, T Engel
NETWORKING 2011, 1-14, 2011
1532011
Malware behaviour analysis
G Wagener, R State, A Dulaunoy
Journal in computer virology 4 (4), 279-287, 2008
1312008
Empirical assessment of machine learning-based malware detectors for Android
K Allix, TF Bissyandé, Q Jérome, J Klein, Y Le Traon
Empirical Software Engineering 21 (1), 183-211, 2016
1292016
Blockchain-based, decentralized access control for IPFS
M Steichen, B Fiz, R Norvill, W Shbair, R State
2018 Ieee international conference on internet of things (iThings) and ieee …, 2018
1222018
The art of the scam: Demystifying honeypots in ethereum smart contracts
CF Torres, M Steichen, R State
28th {USENIX} Security Symposium ({USENIX} Security 19), 1591-1607, 2019
113*2019
A blockchain-based PKI management framework
A Yakubov, W Shbair, A Wallbom, D Sanda
The First IEEE/IFIP International Workshop on Managing and Managed by …, 2018
1092018
BotCloud: Detecting botnets using MapReduce
J Francois, S Wang, W Bronzi, R State, T Engel
Information Forensics and Security (WIFS), 2011 IEEE International Workshop …, 2011
1062011
Large-scale detection of non-technical losses in imbalanced data sets
P Glauner, A Boechat, L Dolberg, R State, F Bettinger, Y Rangoni, ...
2016 IEEE Power & Energy Society Innovative Smart Grid Technologies …, 2016
842016
KiF: a stateful SIP fuzzer
HJ Abdelnur, R State, O Festor
Proceedings of the 1st international conference on Principles, systems and …, 2007
842007
Machine learning approach for ip-flow record anomaly detection
C Wagner, J François, R State, T Engel
NETWORKING 2011. NETWORKING 2011 6640, 2011
82*2011
A big data architecture for large scale security monitoring
S Marchal, X Jiang, R State, T Engel
2014 IEEE International Congress on Big Data, 56-63, 2014
762014
Monitoring SIP Traffic Using Support Vector Machines
M Nassar, R State, O Festor
Recent Advances in Intrusion Detection, 311-330, 2008
732008
Using opcode-sequences to detect malicious Android applications
Q Jerome, K Allix, R State, T Engel
2014 IEEE international conference on communications (ICC), 914-919, 2014
672014
Holistic VoIP intrusion detection and prevention system
M Nassar, S Niccolini, R State, T Ewald
Proceedings of the 1st international conference on Principles, systems and …, 2007
632007
Self Adaptive High Interaction Honeypots Driven by Game Theory
G Wagener, R State, A Dulaunoy, T Engel
622009
A Forensic Analysis of Android Malware--How is Malware Written and How it Could Be Detected?
K Allix, Q Jérome, TF Bissyandé, J Klein, R State, Y Le Traon
2014 IEEE 38th Annual Computer Software and Applications Conference, 384-393, 2014
562014
Voip Honeypot Architecture
M Nassar, R State, O Festor
Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International …, 2007
522007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20