Jan Jusko

According to our database1, Jan Jusko authored at least 8 papers between 2012 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Using Behavioral Similarity for Botnet Command-and-Control Discovery.
IEEE Intell. Syst., 2016

2014
Game Theoretical Model for Adaptive Intrusion Detection System.
Trans. Comput. Collect. Intell., 2014

Identifying peer-to-peer communities in the network by connection graph analysis.
Int. J. Netw. Manag., 2014

2012
Identifying Skype Nodes in the Network Exploiting Mutual Contacts.
Proceedings of the Traffic Monitoring and Analysis - 4th International Workshop, 2012

Revealing Cooperating Hosts by Connection Graph Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2012

Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper.
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2012

Game Theoretical Adaptation Model for Intrusion Detection System.
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2012

Identifying Skype nodes by NetFlow-based graph analysis.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012


  Loading...