Radu State
Cited by
Cited by
BotTrack: tracking botnets using NetFlow and PageRank
J François, S Wang, R State, T Engel
NETWORKING 2011, 1-14, 2011
A big data architecture for large scale security monitoring
S Marchal, X Jiang, R State, T Engel
2014 IEEE International Congress on Big Data, 56-63, 2014
Malware behaviour analysis
G Wagener, R State, A Dulaunoy
Journal in computer virology 4 (4), 279-287, 2008
The challenge of non-technical loss detection using artificial intelligence: A survey
P Glauner, JA Meira, P Valtchev, R State, F Bettinger
arXiv preprint arXiv:1606.00626, 2016
PhishStorm: Detecting phishing with streaming analytics
S Marchal, J François, R State, T Engel
IEEE Transactions on Network and Service Management 11 (4), 458-471, 2014
BotCloud: Detecting botnets using MapReduce
J Francois, S Wang, W Bronzi, R State, T Engel
Information Forensics and Security (WIFS), 2011 IEEE International Workshop …, 2011
Empirical assessment of machine learning-based malware detectors for Android
K Allix, TF Bissyandé, Q Jérome, J Klein, Y Le Traon
Empirical Software Engineering 21 (1), 183-211, 2016
Intrusion detection mechanisms for VoIP applications
M Nassar, R State, O Festor
3rd Annual VoIP Security Workshop, Berlin, Germany 179, 2006
Osiris: Hunting for integer bugs in ethereum smart contracts
F Torres, Christof, J Schütte, R State
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
Malware analysis with graph kernels and support vector machines
C Wagner, G Wagener, R State, T Engel
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference …, 2009
KiF: a stateful SIP fuzzer
HJ Abdelnur, R State, O Festor
Proceedings of the 1st international conference on Principles, systems and …, 2007
Monitoring SIP Traffic Using Support Vector Machines
M Nassar, R State, O Festor
Recent Advances in Intrusion Detection, 311-330, 2008
Holistic VoIP intrusion detection and prevention system
M Nassar, S Niccolini, R State, T Ewald
Proceedings of the 1st international conference on Principles, systems and …, 2007
The art of the scam: Demystifying honeypots in ethereum smart contracts
CF Torres, M Steichen, R State
28th {USENIX} Security Symposium ({USENIX} Security 19), 1591-1607, 2019
Self Adaptive High Interaction Honeypots Driven by Game Theory
G Wagener, R State, A Dulaunoy, T Engel
Blockchain-based, decentralized access control for IPFS
M Steichen, B Fiz, R Norvill, W Shbair, R State
2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018
Using opcode-sequences to detect malicious Android applications
Q Jerome, K Allix, R State, T Engel
2014 IEEE International Conference on Communications (ICC), 914-919, 2014
Large-scale detection of non-technical losses in imbalanced data sets
P Glauner, A Boechat, L Dolberg, R State, F Bettinger, Y Rangoni, ...
2016 IEEE Power & Energy Society Innovative Smart Grid Technologies …, 2016
A Forensic Analysis of Android Malware--How is Malware Written and How it Could Be Detected?
K Allix, Q Jérome, TF Bissyandé, J Klein, R State, Y Le Traon
2014 IEEE 38th Annual Computer Software and Applications Conference, 384-393, 2014
Voip Honeypot Architecture
M Nassar, R State, O Festor
Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20