Follow
Jens Myrup Pedersen
Jens Myrup Pedersen
Verified email at es.aau.dk - Homepage
Title
Cited by
Cited by
Year
A method for classification of network traffic based on C5. 0 Machine Learning Algorithm
T Bujlow, T Riaz, JM Pedersen
2012 international conference on computing, networking and communications …, 2012
1972012
An efficient flow-based botnet detection using supervised machine learning
M Stevanovic, JM Pedersen
2014 international conference on computing, networking and communications …, 2014
1612014
An approach for detection and family classification of malware based on behavioral analysis
SS Hansen, TMT Larsen, M Stevanovic, JM Pedersen
2016 International conference on computing, networking and communications …, 2016
1472016
Analysis of malware behavior: Type classification using machine learning
RS Pirscoveanu, SS Hansen, TMT Larsen, M Stevanovic, JM Pedersen, ...
2015 International conference on cyber situational awareness, data analytics …, 2015
1422015
A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems
A Patel, H Alhussian, JM Pedersen, B Bounabat, JC Júnior, S Katsikas
Computers & Security 64, 92-109, 2017
802017
An analysis of network traffic classification for botnet detection
M Stevanovic, JM Pedersen
2015 International Conference on Cyber Situational Awareness, Data Analytics …, 2015
622015
Machine learning for identifying botnet network traffic
M Stevanovic, JM Pedersen
602013
On the ground truth problem of malicious DNS traffic analysis
M Stevanovic, JM Pedersen, A D'Alconzo, S Ruehrup, A Berger
computers & security 55, 142-158, 2015
552015
An updated taxonomy for characterizing hackers according to their threat properties
SLN Hald, JM Pedersen
2012 14th International Conference on Advanced Communication Technology …, 2012
522012
On the use of machine learning for identifying botnet network traffic
M Stevanovic, JM Pedersen
Journal of Cyber Security and Mobility 4 (2 & 3), 2016
432016
A method for identifying compromised clients based on DNS traffic analysis
M Stevanovic, JM Pedersen, A D’Alconzo, S Ruehrup
International Journal of Information Security 16, 115-132, 2017
392017
A novel methodology towards a trusted environment in mashup web applications
A Patel, S Al-Janabi, I AlShourbaji, J Pedersen
computers & security 49, 107-122, 2015
392015
Converged optical network and data center virtual infrastructure planning
KN Georgakilas, A Tzanakaki, M Anastasopoulos, JM Pedersen
Journal of Optical Communications and Networking 4 (9), 681-691, 2012
392012
SQoS as the base for next generation global infrastructure
OB Madsen, TP Knudsen, JM Pedersen
382003
Assessing measurements of QoS for global cloud computing services
JM Pedersen, MT Riaz, JC Junior, B Dubalski, D Ledzinski, A Patel
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
372011
Classification of HTTP traffic based on C5. 0 Machine Learning Algorithm
T Bujlow, T Riaz, JM Pedersen
2012 IEEE Symposium on Computers and Communications (ISCC), 000882-000887, 2012
342012
Topological routing in large-scale networks
JM Pedersen, TP Knudsen, OB Madsen
The 6th International Conference on Advanced Communication Technology, 2004 …, 2004
332004
Bandwidth analysis of smart meter network infrastructure
K Balachandran, RL Olsen, JM Pedersen
16th International Conference on Advanced Communication Technology, 928-933, 2014
322014
Strategies for the next generation green ICT infrastructure
MT Riaz, JM Gutiérrez, JM Pedersen
2009 2nd international symposium on applied sciences in biomedical and …, 2009
322009
Applying 4-regular grid structures in large-scale access networks
JM Pedersen, A Patel, TP Knudsen, OB Madsen
Computer communications 29 (9), 1350-1362, 2006
282006
The system can't perform the operation now. Try again later.
Articles 1–20