Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimation of cause of ice jam flooding in sub-arctic regions using PALSAR full polarimetry data., , , , and . IGARSS, page 843-846. IEEE, (2014)Malware Classification Method Based on Sequence of Traffic Flow., , , and . ICISSP, page 230-237. SciTePress, (2015)An Adaptive Honeypot System to Capture IPv6 Address Scans., , , , and . CyberSecurity, page 165-172. IEEE Computer Society, (2012)Improving Performance of Anomaly-Based IDS by Combining Multiple Classifiers., , and . SAINT, page 366-371. IEEE Computer Society, (2011)Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval., , , and . ICONIP (3), volume 8836 of Lecture Notes in Computer Science, page 325-332. Springer, (2014)A Dynamic Navigation System Based on User's Geographical Situation., , and . ER Workshops, volume 1552 of Lecture Notes in Computer Science, page 368-379. Springer, (1998)Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation?, , , , , and . IEEE Internet Things J., 9 (13): 10961-10977 (2022)Web Locality Based Ranking Utilizing Location Names and Link Structure., , , and . WISE Workshops, page 56-63. IEEE Computer Society, (2002)A Quantitative Evaluation of a Wide-Area Distributed System with SDN-FIT., , and . COMPSAC, page 607-612. IEEE, (2020)A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System., , , and . DASFAA, volume 4443 of Lecture Notes in Computer Science, page 140-151. Springer, (2007)