MD-Miner: Behavior-Based Tracking of Network Traffic for Malware-Control Domain Detection
Jia-Hao Sun, Tzung-Han Jeng, Chien-Chih Chen, Hsiu-Chuan Huang, Kuo-Sen Chou
Published in 2017 IEEE Third International Conference on Big Data Computing Service and Applications (BigDataService) (01.04.2017)
Published in 2017 IEEE Third International Conference on Big Data Computing Service and Applications (BigDataService) (01.04.2017)
Get full text
Conference Proceeding
CC-Tracker: Interaction Profiling Bipartite Graph Mining for Malicious Network Activity Detection
Jeng, Tzung-Han, Chen, Yi-Ming, Chen, Chien-Chih, Huang, Chuan-Chiang, Chou, Kuo-Sen
Published in 2018 IEEE Conference on Dependable and Secure Computing (DSC) (01.12.2018)
Published in 2018 IEEE Conference on Dependable and Secure Computing (DSC) (01.12.2018)
Get full text
Conference Proceeding
System and method for information security protection and computer readable medium
LEE, YIANG, CHEN, YENUNG, TSAI, TIEN-HAO, CHEN, SHENG-YU, JENG, TZUNG-HAN
Year of Publication 01.04.2022
Get full text
Year of Publication 01.04.2022
Patent
SYSTEM AND METHOD FOR INFORMATION SECURITY PROTECTION AND COMPUTER READABLE MEDIUM
CHEN, SHENG YU, JENG, TZUNG HAN, CHEN, YEN CHUNG, TSAI, TIEN HAO, LEE, YI CHANG
Year of Publication 21.10.2022
Get full text
Year of Publication 21.10.2022
Patent
Method and device for finding amalicious encrypted connection fingerprint
CHEN, CHIENIH, LO, WEN-YANG, HUANG, CHUANIANG, SHIH, CHUN-HSI, JENG, TZUNG-HAN, CHANG, KUANG-HUNG
Year of Publication 16.01.2021
Get full text
Year of Publication 16.01.2021
Patent
METHOD AND DEVICE FOR FINDING AMALICIOUS ENCRYPTED CONNECTION FINGERPRINT
CHEN, CHIENIH, LO, WEN-YANG, HUANG, CHUANIANG, SHIH, CHUN-HSI, JENG, TZUNG-HAN, CHANG, KUANG-HUNG
Year of Publication 21.08.2020
Get full text
Year of Publication 21.08.2020
Patent
TWI634769B
CHOU, KUO SEN, CHEN, CHIEN CHIH, HUANG, HSIU CHUAN, JENG, TZUNG HAN, SHIH, CHUN HSI
Year of Publication 01.09.2018
Get full text
Year of Publication 01.09.2018
Patent
Method for detecting domain flux botnets through proxy server logs capable of detecting hostile networks that do not belong to websites of the normal application program or CDN connection
CHEN, CHIENIH, CHOU, KUO-SEN, HUANG, HSIUUAN, SHIH, CHUN-HSI, JENG, TZUNG-HAN
Year of Publication 16.04.2018
Get full text
Year of Publication 16.04.2018
Patent