Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer Log Anomaly Detection Using Frequent Episodes., , and . AIAI, volume 296 of IFIP Advances in Information and Communication Technology, page 417-422. Springer, (2009)Finding 3G Mobile Network Cells with Similar Radio Interface Quality Problems., , , and . EANN/AIAI (1), volume 363 of IFIP Advances in Information and Communication Technology, page 392-401. Springer, (2011)Towards holistic security management through coherent measuring., and . ECSA Companion Volume, page 155-161. ACM, (2010)Anomaly detection and classification using a metric for determining the significance of failures - Case study: mobile network management data from LTE network., and . Neural Comput. Appl., 28 (6): 1265-1275 (2017)A Metric for Determining the Significance of Failures and Its Use in Anomaly Detection - Case Study: Mobile Network Management Data from LTE Network., and . EANN, volume 517 of Communications in Computer and Information Science, page 171-180. Springer, (2015)Local anomaly detection for mobile network monitoring., and . Inf. Sci., 178 (20): 3840-3859 (2008)Towards Trusted Environment in Cloud Monitoring., , and . ITNG, page 180-185. IEEE Computer Society, (2014)A Method for Deriving and Testing Malicious Behavior Detection Rules., and . TrustCom/BigDataSE/ISPA (1), page 1337-1342. IEEE, (2015)Domain Structures in Filtering Irrelevant Frequent Patterns., and . Database Support for Data Mining Applications, volume 2682 of Lecture Notes in Computer Science, Springer, (2004)Analysing 3G radio network performance with fuzzy methods., , , and . Neurocomputing, (2013)