Author of the publication

Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Convolutional Neural Network-Based Human Detection in Nighttime Images Using Visible Light Camera Sensors., , and . Sensors, 17 (5): 1065 (2017)Haplotype reconstruction from SNP alignment., , and . RECOMB, page 207-216. ACM, (2003)Toward the SIEM architecture for cloud-based security services., , , and . CNS, page 398-399. IEEE, (2017)ICT convergence-based application service development to support the re-configurability of door trim assembly line., , , and . ICTC, page 1126-1128. IEEE, (2016)Realistic Visual Simulation of Water Effects in Response to Human Motion using a Depth Camera., , , and . KSII Trans. Internet Inf. Syst., 11 (2): 1019-1031 (2017)HAPLOWSER: a whole-genome haplotype browser for personal genome and metagenome., , , , and . Bioinform., 25 (18): 2430-2431 (2009)Computational study of conformational preferences of thioamide-containing azaglycine peptides., , , , , , and . J. Comput. Chem., 25 (2): 169-178 (2004)Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call., , , , and . IEICE Trans. Inf. Syst., 99-D (4): 1071-1080 (2016)A Part Release considering Tool Scheduling and Dynamic Tool Allocation in Flexible Manufacturing Systems., and . ICAS, page 12. IEEE Computer Society, (2006)Autonomous Lighting Control Based on Adjustable Illumination Model., , , , , , and . ICISA, page 1-3. IEEE, (2013)