From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Anomaly Detection and Root Cause Analysis on Log Data., , , и . SGAI Conf., том 13652 из Lecture Notes in Computer Science, стр. 333-339. Springer, (2022)Modelling and quantitative analysis of performance vs security trade-offs in computer networks: an investigation into the modelling and discrete-event simulation analysis of performance vs security trade-offs in computer networks, based on combined metrics and stochastic activity networks (SANs).. University of Bradford, UK, (2017)British Library, EThOS.Automated Log Analysis and Anomaly Detection Using Machine Learning., , , и . FSDM, том 358 из Frontiers in Artificial Intelligence and Applications, стр. 137-147. IOS Press, (2022)An Exposition of Performance-Security Trade-offs in RANETs Based on Quantitative Network Models., , и . Wirel. Pers. Commun., 70 (3): 1121-1146 (2013)Towards a Data Quality Framework for Heterogeneous Data., , , и . iThings/GreenCom/CPSCom/SmartData, стр. 155-162. IEEE Computer Society, (2017)Automated Contextual Anomaly Detection for Network Interface Bandwidth Utilisation: A Case Study in Network Capacity Management., , , , , и . CECNet, том 345 из Frontiers in Artificial Intelligence and Applications, стр. 659-666. IOS Press, (2021)Robustness of Automotive SOTA: State-of-the-Art in Uncertainty Modelling., , , и . HPCC/SmartCity/DSS, стр. 1506-1513. IEEE, (2018)