Author of the publication

Framework for Network Topology Generation and Traffic Prediction Analytics for Cyber Exercises.

, , , , , , and . IEEE Access, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Investigation of Learning Model Technologies for Network Traffic Classification Design in Cyber Security Exercises., , , , , , and . IEEE Access, (2023)Malware Containment Using Weight based on Incremental PageRank in Dynamic Social Networks., and . KSII Trans. Internet Inf. Syst., 9 (1): 421-433 (2015)Learning similarity for semantic images classification., , , and . Neurocomputing, (2005)Data Discretization and Decision Boundary Data Point Analysis for Unknown Attack Detection., , and . IEEE Access, (2022)Dark Side of the Web: Dark Web Classification Based on TextCNN and Topic Modeling Weight., , , , , , and . IEEE Access, (2024)A framework of Multi Linear Regression based on Fuzzy Theory and Situation Awareness and its application to Beach Risk Assessment., , , , , , and . KSII Trans. Internet Inf. Syst., 14 (7): 3039-3056 (2020)A study on Classification of Insider threat using Markov Chain Model., , and . KSII Trans. Internet Inf. Syst., 12 (4): 1887-1898 (2018)The study of selective encryption of motion vector based on the S-Box for the security improvement in the process of video., and . Multim. Tools Appl., 71 (3): 1577-1597 (2014)DRM Architecture for Mobile VOD Services., , and . MRCS, volume 4105 of Lecture Notes in Computer Science, page 611-618. Springer, (2006)Open Set Recognition With Dissimilarity Weight for Unknown Attack Detection., , and . IEEE Access, (2023)