default search action
Nurbol Luktarhan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Zhaolei Shi, Nurbol Luktarhan, Yangyang Song, Huixin Yin:
TSFN: A Novel Malicious Traffic Classification Method Using BERT and LSTM. Entropy 25(5): 821 (2023) - [j15]Haojie Wu, Nurbol Luktarhan, Gaoqi Tian, Yangyang Song:
An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs. Sensors 23(10): 4729 (2023) - [j14]Gaoqi Tian, Nurbol Luktarhan, Haojie Wu, Zhaolei Shi:
CLDTLog: System Log Anomaly Detection Method Based on Contrastive Learning and Dual Objective Tasks. Sensors 23(11): 5042 (2023) - [c4]Yonglin Liao, Nurbol Luktarhan, Yue Wang, Qinlin Chen:
Attention-Based BiLSTM For Malware Family Classification. CNIOT 2023: 317-323 - 2022
- [j13]Yiyong Chen, Nurbol Luktarhan, Dan Lv:
LogLS: Research on System Log Anomaly Detection Method Based on Dual LSTM. Symmetry 14(3): 454 (2022) - 2021
- [j12]Chao Ding, Nurbol Luktarhan, Bei Lu, Wenhui Zhang:
A Hybrid Analysis-Based Approach to Android Malware Family Classification. Entropy 23(8): 1009 (2021) - [j11]Xiao Zhongzheng, Nurbol Luktarhan:
Webshell detection with byte-level features based on deep learning. J. Intell. Fuzzy Syst. 40(1): 1585-1596 (2021) - [j10]Dan Lv, Nurbol Luktarhan, Yiyong Chen:
ConAnomaly: Content-Based Anomaly Detection for System Logs. Sensors 21(18): 6125 (2021) - [j9]Bei Lu, Nurbol Luktarhan, Chao Ding, Wenhui Zhang:
ICLSTM: Encrypted Traffic Service Identification Based on Inception-LSTM Neural Network. Symmetry 13(6): 1080 (2021) - [j8]Wenhui Zhang, Nurbol Luktarhan, Chao Ding, Bei Lu:
Android Malware Detection Using TCN with Bytecode Image. Symmetry 13(7): 1107 (2021) - [j7]AiJun Zhou, Nurbol Luktarhan, Zhuang Ai:
Research on WebShell Detection Method Based on Regularized Neighborhood Component Analysis (RNCA). Symmetry 13(7): 1202 (2021) - 2020
- [j6]Zhuang Ai, Nurbol Luktarhan, Yuxin Zhao, Chaofei Tang:
WS-LSMR: Malicious WebShell Detection Algorithm Based on Ensemble Learning. IEEE Access 8: 75785-75797 (2020) - [j5]Zhuang Ai, Nurbol Luktarhan, AiJun Zhou, Dan Lv:
WebShell Attack Detection Based on a Deep Super Learner. Symmetry 12(9): 1406 (2020) - [j4]Chaofei Tang, Nurbol Luktarhan, Yuxin Zhao:
An Efficient Intrusion Detection Method Based on LightGBM and Autoencoder. Symmetry 12(9): 1458 (2020) - [j3]Chaofei Tang, Nurbol Luktarhan, Yuxin Zhao:
SAAE-DNN: Deep Learning Method on Intrusion Detection. Symmetry 12(10): 1695 (2020)
2010 – 2019
- 2019
- [j2]Yan Ding, Nurbol Luktarhan, Keqin Li, Wushour Slamu:
A keyword-based combination approach for detecting phishing webpages. Comput. Secur. 84: 256-275 (2019) - 2018
- [j1]Rong Zhou, Yong Zhang, Shengzhong Feng, Nurbol Luktarhan:
A Novel Hierarchical Clustering Algorithm Based on Density Peaks for Complex Datasets. Complex. 2018: 2032461:1-2032461:8 (2018) - 2016
- [c3]Rong Zhou, Shuang Zhang, Chun Chen, Li Ning, Yong Zhang, Shengzhong Feng, Yi Liu, Nurbol Luktarhan:
A Distance and Density-Based Clustering Algorithm Using Automatic Peak Detection. SmartCloud 2016: 176-183 - 2012
- [c2]Nurbol Luktarhan, Xue Jia, Liang Hu, Nannan Xie:
Multi-stage Attack Detection Algorithm Based on Hidden Markov Model. WISM 2012: 275-282 - 2011
- [c1]Nannan Xie, Liang Hu, Nurbol Luktarhan, Kuo Zhao:
A Classification of Cluster Validity Indexes Based on Membership Degree and Applications. WISM (1) 2011: 43-50
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint