Charles Lim

Orcid: 0000-0003-0910-5506

According to our database1, Charles Lim authored at least 14 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Blind quantum machine learning with quantum bipartite correlator.
CoRR, 2023

2022
Malware Classification Method Using API Call Categorization.
Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry, 2022

Malicious traffic analysis using Markov chain.
Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry, 2022

2020
Botnet Detection Using DNS and HTTP Traffic Analysis.
Proceedings of the ICONETSI 2020: International Conference on Engineering and Information Technology for Sustainable Industry, 2020

Mal-TScore: A Threat Score Framework Based on Static and Dynamic Analysis Features.
Proceedings of the ICONETSI 2020: International Conference on Engineering and Information Technology for Sustainable Industry, 2020

Uncovering Malware Traits Using Hybrid Analysis.
Proceedings of the ICONETSI 2020: International Conference on Engineering and Information Technology for Sustainable Industry, 2020

XT-Pot: eXposing Threat Category of Honeypot-based attacks.
Proceedings of the ICONETSI 2020: International Conference on Engineering and Information Technology for Sustainable Industry, 2020

Finding Fast Flux Traffic in DNS Haystack.
Proceedings of the Critical Information Infrastructures Security, 2020

2019
Mal-Flux: Rendering hidden code of packed binary executable.
Digit. Investig., 2019

2018
Detecting Network Security Threats Using Domain Name System and NetFlow Traffic.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

2016
Analysis of educational institution DNS network traffic for insider threats.
Proceedings of the 2016 International Conference on Computer, 2016

2015
Mal-EVE: Static detection model for evasive malware.
Proceedings of the 10th International Conference on Communications and Networking in China, 2015

2013
PRODML performance evaluation as SOT data exchange standard.
Proceedings of the 2013 International Conference on Computer, 2013

2012
Design and Implementation of the End System to Intermediate System (ES-IS) Routing Information Exchange Protocol as a Loadable Kernel Module in Linux Kernel 2.6.
CoRR, 2012


  Loading...