Author of the publication

A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems.

, , , , and . SIN, page 302. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing., , , , and . CoRR, (2017)Received Signal Strength Intensity Based Localization of Partial Discharge in High Voltage Systems., , , , , , , , , and . ICAC, page 1-5. IEEE, (2018)Machine Learning Approach for Detectionof nonTor Traffic., , , , , and . J. Cyber Secur. Mobil., 6 (2): 171-194 (2017)RAID 6 Hardware Acceleration., , and . ACM Trans. Embed. Comput. Syst., 10 (4): 43:1-43:17 (2011)Utilising Flow Aggregation to Classify Benign Imitating Attacks., , , , , and . Sensors, 21 (5): 1761 (2021)A Review of Cyber-Ranges and Test-Beds: Current and Future Trends., , , , , , , , , and . Sensors, 20 (24): 7148 (2020)Detecting Cloud Presence In Satellite Images Using The RGB-based Clip Vision-Language Model., , and . IGARSS, page 5170-5173. IEEE, (2023)Developing a Siamese Network for Intrusion Detection Systems., , , , and . EuroMLSys@EuroSys, page 120-126. ACM, (2021)Model-driven data harvesting to publish provenance for geospatial references., , , , , and . K-CAP, page 121-124. ACM, (2013)Data remanence and digital forensic investigation for CUDA Graphics Processing Units., , , , , , and . IM, page 1345-1350. IEEE, (2015)