Author of the publication

Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks.

, , , , , and . CSCloud, page 205-210. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection., , and . CoRR, (2018)Role-based policy distribution techniques in policy-based networks., , , and . Communications, Internet, and Information Technology, page 103-107. IASTED/ACTA Press, (2004)A survey of deep learning-based network anomaly detection., , , , , and . Clust. Comput., 22 (Suppl 1): 949-961 (2019)Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection., , and . SNTA@HPDC, page 45-48. ACM, (2019)Improving signature quality for network application identification., , , and . Digit. Commun. Networks, 5 (3): 139-146 (2019)Learning-based Dynamic Cache Management in a Cloud., , and . CoRR, (2019)A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking., , , , , , and . LCN, page 319-322. IEEE, (2021)Towards Securing Availability in 5G: Analyzing the Injection Attack Impact on Core Network., , , , , and . SVCC, volume 1536 of Communications in Computer and Information Science, page 143-154. Springer, (2021)SNTA'22: The 5th Workshop on Systems and Network Telemetry and Analytics., , , and . HPDC, page 296-297. ACM, (2022)Towards Securing UAV Flying Base Station: Misplacement Impact Analyses on Battery and Power., , , and . SNTA@HPDC, page 3-8. ACM, (2023)