Author of the publication

An Anomaly Detection System Based on Chi-Square Method with Dynamic BIN Algorithm.

, , , and . BWCCA, page 549-554. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Token-based Code Clone Detection Technique in a Student's Programming Exercise., , and . BWCCA, page 650-655. IEEE, (2012)The Evaluation of an Anomaly Detection System Based on Chi-square Method., , and . AINA Workshops, page 708-713. IEEE Computer Society, (2012)Anomaly Detection Using Chi-square Values Based on the Typical Features and the Time Deviation., , and . AINA, page 97-104. IEEE Computer Society, (2011)Early DoS/DDoS Detection Method using Short-term Statistics., , and . CISIS, page 168-173. IEEE Computer Society, (2010)Extraction for Characteristics of Anomaly Accessed IP Packets Based on Statistical Analysis., , and . IIH-MSP, page 55-58. IEEE Computer Society, (2007)Detection of JavaScript of Malware with Un-readability Using Mahalanobis-Distance., , , and . BWCCA, page 497-502. IEEE Computer Society, (2014)Computational Complexity of Anomaly Detection Methods., and . BWCCA, page 644-649. IEEE, (2012)A Study of Malicious PDF Detection Technique., , and . CISIS, page 197-203. IEEE Computer Society, (2016)Extraction of Characteristics of Anomaly Accessed IP Packets Using Chi-square Method., , and . CISIS, page 287-292. IEEE Computer Society, (2009)A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise., , and . BWCCA, page 575-580. IEEE, (2013)