Author of the publication

DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata.

, , , , and . IEEE Trans. Inf. Forensics Secur., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image-to-video person re-identification with cross-modal embeddings., , , , and . Pattern Recognit. Lett., (2020)Using context information to enhance simple question answering., , , and . World Wide Web, 24 (1): 249-277 (2021)A Survey on Knowledge Management in Software Engineering., , and . QRS Companion, page 237-244. IEEE, (2015)CAT: A Customized Automata Toolkit., , , , and . QRS Companion, page 171-177. IEEE, (2016)An Evaluation Framework of Knowledge Management Activities., , , and . QRS Companion, page 194-201. IEEE, (2016)Lifetime Extension of Software Execution Subject to Aging., , , and . IEEE Trans. Reliability, 66 (1): 123-134 (2017)Service Systems Development Based on a Knowledge Synthesis Methodology., , , , and . QRS Companion, page 245-250. IEEE, (2015)Analysis of Persistence of Relevance in Systems with Imperfect Fault Coverage., , , and . SAFECOMP, volume 8666 of Lecture Notes in Computer Science, page 109-124. Springer, (2014)CVSkSA: cross-architecture vulnerability search in firmware based on kNN-SVM and attributed control flow graph., , , , , , , and . Softw. Qual. J., 27 (3): 1045-1068 (2019)A Hybrid Deep Learning Model Considering External Factors for Accurate Short-Term Traffic Flow Prediction., , , , and . CNIOT, page 607-613. ACM, (2023)