From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework., , и . Expert Syst. Appl., (июля 2023)Stacked Generalizations in Imbalanced Fraud Data Sets using Resampling Methods., и . CoRR, (2020)A maximum expected covering problem for locating and dispatching two classes of military medical evacuation air assets., , и . Optim. Lett., 9 (8): 1511-1531 (2015)Real-time Network Intrusion Detection via Decision Transformers., , , , , и . CoRR, (2023)Measuring Classification Decision Certainty and Doubt., , , , и . CoRR, (2023)Robust Decision-Making in the Internet of Battlefield Things Using Bayesian Neural Networks., , , и . WSC, стр. 1-12. IEEE, (2021)Seeing the Whole Elephant - A Comprehensive Framework for Data Education., , , , и . SIGCSE (1), стр. 248-254. ACM, (2024)A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models., , и . MILCOM, стр. 1011-1016. IEEE, (2021)Context-aware Collaborative Neuro-Symbolic Inference in IoBTs., , , , , и . MILCOM, стр. 1053-1058. IEEE, (2022)Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets., , , , , и . BDCAT, стр. 58-67. IEEE, (2022)