Author of the publication

Network Anomaly Detection: Methods, Systems and Tools.

, , and . IEEE Commun. Surv. Tutorials, 16 (1): 303-336 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Surveying Port Scans and Their Detection Methodologies., , and . Comput. J., 54 (10): 1565-1581 (2011)Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation., , , and . Int. J. Netw. Secur., 18 (3): 474-480 (2016)Survey on Incremental Approaches for Network Anomaly Detection, , and . CoRR, (2012)SURE-H: A Secure IoT Enabled Smart Home System., , and . WF-IoT, page 59-63. IEEE, (2019)Towards a Workload Mapping Model for Tuning Backing Services in Cloud Systems., , and . DEXA (1), volume 14146 of Lecture Notes in Computer Science, page 266-280. Springer, (2023)Cformer: Semi-Supervised Text Clustering Based on Pseudo Labeling., , , and . CIKM, page 3078-3082. ACM, (2021)NADO: network anomaly detection using outlier approach., , and . ICCCS, page 531-536. ACM, (2011)ADCluster: Adaptive Deep Clustering for Unsupervised Learning from Unlabeled Documents., , , and . ICNLSP, page 68-77. Association for Computational Linguistics, (2023)Identification and Classification of Cyberbullying Posts: A Recurrent Neural Network Approach Using Under-Sampling and Class Weighting., , , , , and . ICONIP (5), volume 1333 of Communications in Computer and Information Science, page 113-120. Springer, (2020)Network Traffic Anomaly Detection and Prevention - Concepts, Techniques, and Tools, , and . Computer Communications and Networks Springer, (2017)