Author of the publication

Scalable Security Event Aggregation for Situation Analysis.

, , , , and . BigDataService, page 14-23. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach to online network monitoring using clustered patterns., , , and . ICNC, page 656-661. IEEE Computer Society, (2017)DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing., , , , , , , and . International Conference on Computational Science (1), volume 4487 of Lecture Notes in Computer Science, page 1222-1229. Springer, (2007)Federated Wireless Network Intrusion Detection., , , , and . IEEE BigData, page 6004-6006. IEEE, (2019)An Encoding Technique for CNN-based Network Anomaly Detection., , , , and . IEEE BigData, page 2960-2965. IEEE, (2018)A Learning-based Data Augmentation for Network Anomaly Detection., , , , and . ICCCN, page 1-10. IEEE, (2020)NGS: Service Adaptation in Open Grid Platforms., , , and . IPDPS, page 1-8. IEEE, (2007)Transfer Learning Approach for Botnet Detection Based on Recurrent Variational Autoencoder., , , , and . SNTA@HPDC, page 41-47. ACM, (2020)Evaluation of Deep Learning Models for Network Performance Prediction for Scientific Facilities., , and . SNTA@HPDC, page 53-56. ACM, (2020)Passive Network Performance Estimation for Large-Scale, Data-Intensive Computing., , and . IEEE Trans. Parallel Distributed Syst., 22 (8): 1365-1373 (2011)A lightweight network anomaly detection technique., , , , and . ICNC, page 896-900. IEEE Computer Society, (2017)