Author of the publication

Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Location-based personalized social media service for the Smart Phone: Distributed social contents sharings., , , and . ICITST, page 655-659. IEEE, (2011)Design and implementation of the Geo-Context Engine for semantic social media service., , , and . ICITST, page 383-387. IEEE, (2011)Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles., , , and . IEEE Access, (2019)CWD30: A Comprehensive and Holistic Dataset for Crop Weed Recognition in Precision Agriculture., , , , , , and . CoRR, (2023)Design and implementation of a service oriented power saving system for the home network, , , , and . Consumer Electronics, 2009. ICCE '09. Digest of Technical Papers International Conference on, page 1 -2. (January 2009)Provision of the multimedia service framework in the ubiquitous home network., , , , and . IEEE Trans. Consumer Electronics, 54 (2): 501-506 (2008)TransSentLog: Interpretable Anomaly Detection Using Transformer and Sentiment Analysis on Individual Log Event., and . IEEE Access, (2023)An Abnormal Connection Detection System based on network flow analysis., , and . ICCE-Berlin, page 71-75. IEEE, (2015)Non-Invasive Optical Coherence Tomography Data-Based Quantitative Algorithm for the Assessment of Residual Adhesive on Bracket-Removed Dental Surface., , , , , , , , , and 4 other author(s). Sensors, 21 (14): 4670 (2021)SWC-based Smart Contract Development Guide Research., , and . ICACT, page 138-141. IEEE, (2022)