From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Feature Analysis for ML-based IIoT Intrusion Detection., , и . CoRR, (2021)An Explainable Machine Learning-based Network Intrusion Detection System for Enabling Generalisability in Securing IoT Networks., , и . CoRR, (2021)Exploring edge TPU for network intrusion detection in IoT., , , , и . J. Parallel Distributed Comput., (сентября 2023)Graph Neural Network-based Android Malware Classification with Jumping Knowledge., , , , и . DSC, стр. 1-9. IEEE, (2022)DOC-NAD: A Hybrid Deep One-class Classifier for Network Anomaly Detection., , , , и . CCGridW, стр. 1-7. IEEE, (2023)Towards a Standard Feature Set for Network Intrusion Detection System Datasets., , и . Mob. Networks Appl., 27 (1): 357-370 (2022)Exploring Edge TPU for Network Intrusion Detection in IoT., , , , и . CoRR, (2021)E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT., , , , и . NOMS, стр. 1-9. IEEE, (2022)Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-Based Network Intrusion Detection., , и . Big Data Res., (2022)From zero-shot machine learning to zero-day attack detection., , , и . Int. J. Inf. Sec., 22 (4): 947-959 (2023)