Author of the publication

Host-based intrusion detection with multi-datasource and deep learning.

, , , , , , and . J. Inf. Secur. Appl., (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems., , , and . IEEE Commun. Surv. Tutorials, 14 (4): 1011-1020 (2012)An event-based SDN architecture for network security analysis., , and . ICCST, page 159-164. IEEE, (2015)Toward Optimal Resource Allocation of Virtualized Network Functions for Hierarchical Datacenters., , , , and . IEEE Trans. Network and Service Management, 15 (4): 1532-1544 (2018)Re-examining the performance bottleneck in a NIDS with detailed profiling., and . J. Netw. Comput. Appl., 36 (2): 768-780 (2013)Real-time image tracking for automatic traffic monitoring and enforcement applications., , , and . Image Vis. Comput., 22 (6): 485-501 (2004)A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning., , and . IEEE Trans. Computers, 60 (4): 594-601 (2011)On-the-Fly Capture and Replay Mechanisms for Multi-Port Network Devices in Operational Networks., , , and . IEEE Trans. Network and Service Management, 11 (2): 158-171 (2014)Evolution and Evaluation of Internet Content Delivery., , and . International Conference on Internet Computing, page 502-505. CSREA Press, (2003)Hardware-Software Codesign for High-Speed Signature-based Virus Scanning., , , and . IEEE Micro, 29 (5): 56-65 (2009)A powerful and efficient multivariate approach for voxel-level connectome-wide association studies., , , , , , , , and . NeuroImage, (2019)