Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Feb 2, 2017 · We show that by choosing the parameter of the proposed clustering process optimally using a blacklist, hence making it blacklist-aware, we ...
Jun 1, 2017 · We show that by choosing the parameter of the proposed clustering process optimally using a blacklist, hence making it blacklist-aware, we ...
We show that by choosing the parameter of the proposed clustering process optimally using a blacklist, hence making it blacklist-aware, we significantly improve ...
People also ask
Abstract—Most complex tasks on the Internet—both malicious and benign—are collectively carried out by clusters of IP ad- dresses. We demonstrate that it is ...
This paper proposes a novel clustering framework which can be applied on data sets of network interactions to identify IP clusters carrying out a specific ...
Video for (Un)wisdom of Crowds: Accurately Spotting Malicious IP Clusters Using Not-So-Accurate IP Blacklists.
Duration: 2:12
Posted: Jul 18, 2017
Missing: Crowds: Accurately Spotting Malicious
Aug 16, 2023 · [11] Baris Coskun. (un) wisdom of crowds: Accurately spotting malicious ip clusters using not-so-accurate ip blacklists. IEEE Transactions on.
May 20, 2023 · Coskun, “(un) wisdom of crowds: accurately spotting malicious ip clusters using not-so-accurate ip blacklists,” IEEE Transactions on ...
Feb 1, 2022 · Coskun B(Un)Wisdom of crowds: Accurately spotting malicious IP clusters using not-so-accurate IP blacklistsIEEE Transactions on Information ...
Sep 14, 2022 · (Un)wisdom of crowds: accurately spotting malicious IP clusters using not-so-accurate IP blacklists. IEEE Trans Inf Forens Secur. 2017;12(6): ...