Author of the publication

Detecting Malicious Behavior in Computer Networks via Cost-Sensitive and Connectivity Constrained Classification.

, , , and . SDM, page 117-125. SIAM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

More than "Relevance" - Multi-Dimensional Information Quality Enhancement for Next Generation Search Engine., , and . ICIQ, MIT Information Quality Program, (2014)Noise Analysis and Design of Current Accumulator for TDI-CMOS Image Sensor., , , and . Journal of Circuits, Systems, and Computers, (2013)Enterprise Metadata Management: Identifying Success Factors For Implementing Managed Metadata Environments., , and . PACIS, page 42. (2012)The Drawing Process and Human Activity Problem Solving.. PACIS, page 44. AISeL, (2003)Doppler and/or beyond-GI multipath compensation by using an antenna array for OFDM receiver (Poster)., and . VNC, page 137-143. IEEE, (2012)An affine scaling derivative-free trust region method with interior backtracking technique for bounded-constrained nonlinear programming., and . J. Systems Science & Complexity, 27 (3): 537-564 (2014)An Extended-Counting Incremental Sigma-Delta ADC with Hardware-Reuse Technique., , , and . Journal of Circuits, Systems, and Computers, 25 (5): 1650038:1-1650038:13 (2016)Classification of Pulmonary Nodules by using Improved Convolutional Neural Networks., , and . COMPSAC (2), page 411-416. IEEE, (2019)Consensus extraction from heterogeneous detectors to improve performance over network traffic anomaly detection., , , , , , and . INFOCOM, page 181-185. IEEE, (2011)Two (2 + 1)-dimensional hierarchies of evolution equations and their Hamiltonian structures., , and . Appl. Math. Comput., (2014)