![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Tell Them from Me: An Encrypted Application Profiler
Profiling internet users associated with encrypted applications has been a long-standing challenging issue that helps to identify targeted users’ interests. This paper proposes a machine-learning based solutio...
-
Chapter and Conference Paper
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining
Host behaviour modelling is widely deployed in today’s corporate environments to aid in the detection and analysis of cyber attacks. Audit logs containing system-level events are frequently used for behavior m...
-
Chapter
Security and Privacy of IoT Devices for Aging in Place
The rising cost of elderly living and care facilities prompts for other solutions for the elderly people where aging in place is one of the ways to solve this issue using emerging technologies centered around ...