Search results
Total Center Activate; Batch Start and End Date; Apply Online ...
Our method first distinguishes crypto-mining activities by profiling the traffic with fast Fourier transform at each time window. It then generates the variation vectors between adjacent time windows and leverages a recurrent neural network to identify the cryptojacking patterns.
Computer Education. Software Development. Job Placement.
I am a Ph.D. student in the Department of Computer and Information Science at the University of Oregon (UO), and conduct research at the Center for Cyber Security and Privacy (CCSP). I received my B.S. degree from the University of Texas at Arlington in Computer Science.
Candidate Login.
In-network filtering of distributed denial-of-service traffic with near-optimal rule selection. D Sisodia, J Li, L Jiao. Proceedings of the 15th ACM Asia Conference on Computer and Communications...
Publications CONFERENCES In-NetworkFilteringofDistributedDenial-of-ServiceTrafficwithNear-OptimalRuleSelection DEVKISHENSISODIA,JUNLI,LEIJIAO ...