Author of the publication

Defense Strategies against Byzantine Attacks in a Consensus-Based Network Intrusion Detection System.

, , , and . Informatica (Slovenia), (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extended Model Space Specification for Mobile Agent-Based Systems to Support Automated Discovery of Simulation Models., and . WSC, page 2233-2244. IEEE, (2020)Preparation and optimization of a diverse workload for a large-scale heterogeneous system., , , , , , , , , and 69 other author(s). SC, page 32:1-32:17. ACM, (2019)FoveaBox with Consistent Label Assignment Distillation for Page Object Detection., , and . MAPR, page 1-6. IEEE, (2023)Spares Optimization for the Lockheed Martin Joint Strike Fighter., , , , , and . WSC, page 14. IEEE Computer Society, (2004)A brief review of state-of-the-art object detectors on benchmark document images datasets., , , , and . Int. J. Document Anal. Recognit., 26 (4): 433-451 (December 2023)Robust consensus-based network intrusion detection in presence of Byzantine attacks., , , and . SoICT, page 278-285. ACM, (2016)Defense Strategies against Byzantine Attacks in a Consensus-Based Network Intrusion Detection System., , , and . Informatica (Slovenia), (2017)Thresholding Greedy Pursuit for Sparse Recovery Problems., and . CoRR, (2021)A Wineinformatics Study for White-box Classification Algorithms to Understand and Evaluate Wine Judges., , , and . Trans. Mach. Learn. Data Min., 10 (1): 3-24 (2017)Large Language Models Meet Knowledge Graphs to Answer Factoid Questions., , , , , , and . PACLIC, page 635-644. Association for Computational Linguistics, (2023)