From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles., , , и . IEEE Access, (2019)An Abnormal Connection Detection System based on network flow analysis., , и . ICCE-Berlin, стр. 71-75. IEEE, (2015)An approach to online network monitoring using clustered patterns., , , и . ICNC, стр. 656-661. IEEE Computer Society, (2017)Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points., , , и . APNOMS, том 5787 из Lecture Notes in Computer Science, стр. 385-394. Springer, (2009)Hue Modeling for Object Tracking in Multiple Non-overlapping Cameras., и . MIWAI, том 8271 из Lecture Notes in Computer Science, стр. 69-78. Springer, (2013)Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme., , , , и . Security and Management, стр. 452-456. CSREA Press, (2009)A lightweight network anomaly detection technique., , , , и . ICNC, стр. 896-900. IEEE Computer Society, (2017)Anomaly detection method using network pattern analysis of process., и . WorldCIS, стр. 159-163. IEEE, (2015)An Empirical Evaluation of Deep Learning for Network Anomaly Detection., , , , , и . IEEE Access, (2019)Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking., , , , , , и . IEEE ICBC, стр. 1-9. IEEE, (2021)