Author of the publication

A dynamic and scalable parallel Network Intrusion Detection System using intelligent rule ordering and Network Function Virtualization.

, , , and . Future Gener. Comput. Syst., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliable modeling of CPU usage in an office worker environment., , and . SAC, page 480-483. ACM, (2016)An Incremental Approach for Swift OpenFlow Anomaly Detection., , and . LCN, page 502-510. IEEE, (2018)Distributed learning automata for solving a classification task., , and . CEC, page 3999-4006. IEEE, (2016)Achieving Connectivity Between Wide Areas Through Self-Organising Robot Swarm Using Embodied Evolution., , , , , and . CoRR, (2018)Estimating Tukey depth using incremental quantile estimators., , and . Pattern Recognit., (2022)Single image dehazing using a new color channel., , , and . J. Vis. Commun. Image Represent., (2021)Investigating Rules and Parameters of Reservoir Computing with Elementary Cellular Automata, with a Criticism of Rule 90 and the Five-Bit Memory Benchmark., , , , and . Complex Syst., 32 (3): 309-351 (December 2023)Distributed learning automata-based scheme for classification using novel pursuit scheme., and . Appl. Intell., 50 (7): 2222-2238 (2020)Recovering Request Patterns to a CPU Processor from Observed CPU Consumption Data., , , , and . INISCOM, volume 188 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 14-28. (2016)Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations., , , , and . RACS, page 161-166. ACM, (2020)