Cong Dong

Orcid: 0000-0001-7581-7160

According to our database1, Cong Dong authored at least 15 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unveiling encrypted traffic types through hierarchical network characteristics.
Comput. Secur., March, 2024

E-DoH: Elegantly Detecting the Depths of Open DoH Service on the Internet.
CoRR, 2024

2023
CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection.
IEEE Trans. Inf. Forensics Secur., 2023

HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection.
Comput. Secur., 2023

C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement.
Comput. Secur., 2023

2022
Only Header: a reliable encrypted traffic classification framework without privacy risk.
Soft Comput., December, 2022

2021
MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree.
IEEE Trans. Inf. Forensics Secur., 2021

BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
MBTree: Detecting Encryption RAT Communication Using Malicious Behavior Tree.
CoRR, 2020

CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification.
Comput. Networks, 2020

Energy and exergy analysis of poly-generation system of hydrogen and electricity via coal partial gasification.
Comput. Chem. Eng., 2020

CSMD: a computational subtraction-based microbiome discovery pipeline for species-level characterization of clinical metagenomic samples.
Bioinform., 2020

Optimization of RDMA-Based HDFS Data Distribution Mechanism.
Proceedings of the Network and Parallel Computing, 2020

2019
An Approach for Scale Suspicious Network Events Detection.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2015
Robust recovery of wideband block-sparse spectrum based on MAP and MMSE estimator.
Proceedings of the 2015 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) Proceedings, 2015


  Loading...