Author of the publication

A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description.

, , , and . NPC, volume 3222 of Lecture Notes in Computer Science, page 443-450. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table., , and . Trustcom/BigDataSE/ISPA, page 394-401. IEEE, (2016)Social Bots Detection on Mobile Social Networks., and . Int. J. Netw. Secur., 19 (1): 163-166 (2017)Trust-Aware sensing Quality estimation for team Crowdsourcing in social IoT., , , , and . Comput. Networks, (2021)A Longitudinal Investigation of the Efficacy of Supported In-Home Post-Stroke Rehabilitation., , , , and . IEEE Access, (2020)An Adaptive Service Strategy Based on User Rating in P2P., , , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 860-870. Springer, (2005)PerformTrust: Trust model integrated past and current performance in P2P file sharing systems., , , and . AICCSA, page 718-725. IEEE Computer Society, (2008)Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing., , and . TrustCom, page 328-335. IEEE Computer Society, (2011)A Worm Containment Model Based on Neighbor-Alarm., , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 449-457. Springer, (2007)一种安全风险可控的弹性移动云计算通用框架 (Risk-controllable Common Elastic Mobile Cloud Computing Framework)., , , and . 计算机科学, 42 (Z11): 357-363 (2015)Function Risk Assessment Under Memory Leakage., , , , and . NaNA, page 284-291. IEEE, (2018)