Using Network Motifs to Identify Application Protocols EG Allan Jr, WH Turkett, EW Fulp GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-7, 2009 | 34 | 2009 |
Anomaly detection using nonnegative matrix factorization EG Allan, MR Horvath, CV Kopek, BT Lamb, TS Whaples, MW Berry Survey of text mining II: clustering, classification, and retrieval, 203-217, 2008 | 26 | 2008 |
Graph Mining of Motif Profiles For Computer Network Activity Inference W Turkett, E Fulp, C Lever, JE Allan Ninth Workshop on Mining and Learning with Graphs, 2011 | 11 | 2011 |
An efficient multi-stage approach for identifying domain shadowing NH Hamilton, S McKinney, E Allan, EW Fulp ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-7, 2020 | 3 | 2020 |
Identifying application protocols in computer networks using vertex profiles E Allan Jr Wake Forest University, 2008 | 2 | 2008 |
Cluster Analysis of Passive DNS Features for Identifying Domain Shadowing Infrastructure N Hamilton, E Allan, Fulp, Errin ISNCC 2020-2020 IEEE International Symposium on Networks, Computers and …, 2020 | | 2020 |