Author of the publication

Detecting stealthy attacks against industrial control systems based on residual skewness analysis.

, , , , , and . EURASIP J. Wireless Comm. and Networking, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Value Management to Real Estate Project Planning., , and . ICEE, page 2664-2667. IEEE Computer Society, (2010)A machine learning correction for DFT non-covalent interactions based on the S22, S66 and X40 benchmark databases., , , , , , , , and . J. Cheminformatics, 8 (1): 24:1-24:17 (2016)Application of flipped classroom based on the Rain Classroom in the teaching of computer-aided landscape design., , , , and . Comput. Appl. Eng. Educ., 28 (2): 357-366 (2020)Design of experiment course "Computer-aided landscape design" based on flipped classroom., , , and . Comput. Appl. Eng. Educ., 24 (2): 234-240 (2016)Automatic subarachnoid space segmentation and hemorrhage detection in clinical head CT scans., , , , , and . Int. J. Comput. Assist. Radiol. Surg., 7 (4): 507-516 (2012)Attention-Based Bi-LSTM Model for Anomalous HTTP Traffic Detection, , , , and . 2018 15th International Conference on Service Systems and Service Management (ICSSSM), (2018)A Novel and Efficient Voice Activity Detector Using Shape Features of Speech Wave., , and . CCBR, volume 8833 of Lecture Notes in Computer Science, page 375-384. Springer, (2014)A Check-In System Leveraging Face Recognition., , , and . iThings/GreenCom/CPSCom/SmartData, page 412-418. IEEE, (2018)SCTM: A Multi-View Detecting Approach Against Industrial Control Systems Attacks., , , , , and . ICC, page 1-6. IEEE, (2019)Synthesis of network delays for voice packets in service overlay networks., and . QSHINE, page 5. ACM, (2007)