MalSpot: Multi2 Malicious Network Behavior Patterns Analysis. Mao, C., Wu, C., Papalexakis, E. E., Faloutsos, C., Lee, K., & Kao, T. In Tseng, V. S., Ho, T. B., Zhou, Z., Chen, A. L. P., & Kao, H., editors, Advances in Knowledge Discovery and Data Mining - 18th Pacific-Asia Conference, PAKDD 2014, Tainan, Taiwan, May 13-16, 2014. Proceedings, Part I, volume 8443, of Lecture Notes in Computer Science, pages 1–14, 2014. Springer.
Paper doi bibtex @inproceedings{DBLP:conf/pakdd/MaoWPFLK14,
author = {Ching{-}Hao Mao and
Chung{-}Jung Wu and
Evangelos E. Papalexakis and
Christos Faloutsos and
Kuo{-}Chen Lee and
Tien{-}Cheu Kao},
editor = {Vincent S. Tseng and
Tu Bao Ho and
Zhi{-}Hua Zhou and
Arbee L. P. Chen and
Hung{-}Yu Kao},
title = {MalSpot: Multi2 Malicious Network Behavior Patterns Analysis},
booktitle = {Advances in Knowledge Discovery and Data Mining - 18th Pacific-Asia
Conference, {PAKDD} 2014, Tainan, Taiwan, May 13-16, 2014. Proceedings,
Part {I}},
series = {Lecture Notes in Computer Science},
volume = {8443},
pages = {1--14},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-06608-0\_1},
doi = {10.1007/978-3-319-06608-0\_1},
timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/pakdd/MaoWPFLK14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"Hc2ScRpKJMLjEei7F","bibbaseid":"mao-wu-papalexakis-faloutsos-lee-kao-malspotmulti2maliciousnetworkbehaviorpatternsanalysis-2014","author_short":["Mao, C.","Wu, C.","Papalexakis, E. E.","Faloutsos, C.","Lee, K.","Kao, T."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Ching-Hao"],"propositions":[],"lastnames":["Mao"],"suffixes":[]},{"firstnames":["Chung-Jung"],"propositions":[],"lastnames":["Wu"],"suffixes":[]},{"firstnames":["Evangelos","E."],"propositions":[],"lastnames":["Papalexakis"],"suffixes":[]},{"firstnames":["Christos"],"propositions":[],"lastnames":["Faloutsos"],"suffixes":[]},{"firstnames":["Kuo-Chen"],"propositions":[],"lastnames":["Lee"],"suffixes":[]},{"firstnames":["Tien-Cheu"],"propositions":[],"lastnames":["Kao"],"suffixes":[]}],"editor":[{"firstnames":["Vincent","S."],"propositions":[],"lastnames":["Tseng"],"suffixes":[]},{"firstnames":["Tu","Bao"],"propositions":[],"lastnames":["Ho"],"suffixes":[]},{"firstnames":["Zhi-Hua"],"propositions":[],"lastnames":["Zhou"],"suffixes":[]},{"firstnames":["Arbee","L.","P."],"propositions":[],"lastnames":["Chen"],"suffixes":[]},{"firstnames":["Hung-Yu"],"propositions":[],"lastnames":["Kao"],"suffixes":[]}],"title":"MalSpot: Multi2 Malicious Network Behavior Patterns Analysis","booktitle":"Advances in Knowledge Discovery and Data Mining - 18th Pacific-Asia Conference, PAKDD 2014, Tainan, Taiwan, May 13-16, 2014. Proceedings, Part I","series":"Lecture Notes in Computer Science","volume":"8443","pages":"1–14","publisher":"Springer","year":"2014","url":"https://doi.org/10.1007/978-3-319-06608-0\\_1","doi":"10.1007/978-3-319-06608-0_1","timestamp":"Sun, 25 Oct 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/pakdd/MaoWPFLK14.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/pakdd/MaoWPFLK14,\n author = {Ching{-}Hao Mao and\n Chung{-}Jung Wu and\n Evangelos E. Papalexakis and\n Christos Faloutsos and\n Kuo{-}Chen Lee and\n Tien{-}Cheu Kao},\n editor = {Vincent S. Tseng and\n Tu Bao Ho and\n Zhi{-}Hua Zhou and\n Arbee L. P. Chen and\n Hung{-}Yu Kao},\n title = {MalSpot: Multi2 Malicious Network Behavior Patterns Analysis},\n booktitle = {Advances in Knowledge Discovery and Data Mining - 18th Pacific-Asia\n Conference, {PAKDD} 2014, Tainan, Taiwan, May 13-16, 2014. Proceedings,\n Part {I}},\n series = {Lecture Notes in Computer Science},\n volume = {8443},\n pages = {1--14},\n publisher = {Springer},\n year = {2014},\n url = {https://doi.org/10.1007/978-3-319-06608-0\\_1},\n doi = {10.1007/978-3-319-06608-0\\_1},\n timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/pakdd/MaoWPFLK14.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Mao, C.","Wu, C.","Papalexakis, E. E.","Faloutsos, C.","Lee, K.","Kao, T."],"editor_short":["Tseng, V. S.","Ho, T. B.","Zhou, Z.","Chen, A. L. P.","Kao, H."],"key":"DBLP:conf/pakdd/MaoWPFLK14","id":"DBLP:conf/pakdd/MaoWPFLK14","bibbaseid":"mao-wu-papalexakis-faloutsos-lee-kao-malspotmulti2maliciousnetworkbehaviorpatternsanalysis-2014","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-319-06608-0\\_1"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/f/CFaloutsos.bib","dataSources":["zM4wMHSu34vjmb6Cm"],"keywords":[],"search_terms":["malspot","multi2","malicious","network","behavior","patterns","analysis","mao","wu","papalexakis","faloutsos","lee","kao"],"title":"MalSpot: Multi2 Malicious Network Behavior Patterns Analysis","year":2014}