Author of the publication

Packet- vs. Session-Based Modeling for Intrusion Detection Systems.

, , and . ITCC (1), page 116-121. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Cluster Computing Architecture., , and . PDPTA, page 290-293. CSREA Press, (2005)Integrating Pre-Trained Language Model with Physical Layer Communications., , , and . CoRR, (2024)Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND)., , and . ACM Southeast Regional Conference, page 175-179. ACM, (2006)A survey of data mining techniques for malware detection using file features., , and . ACM Southeast Regional Conference, page 509-510. ACM, (2008)Resilient Image Fusion., , and . ICPP Workshops, page 291-298. IEEE Computer Society, (2000)An Extended IGMP Protocol for Mobile IPTV Services in Mobile WiMAX., , , and . MOBILWARE, volume 48 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 413-426. Springer, (2010)Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency., , and . IAW, page 135-143. IEEE, (2003)Efficient Virus Detection Using Dynamic Instruction Sequences., , and . J. Comput., 4 (5): 405-414 (2009)PMNet: Large-Scale Channel Prediction System for ICASSP 2023 First Pathloss Radio Map Prediction Challenge., , , and . ICASSP, page 1-2. IEEE, (2023)Simulation of FMCW and M-Sequence Ground Penetrating Radar Systems., , , , , and . RWS, page 142-145. IEEE, (2022)