From post

An Approach to Meta-Alert Generation for Anomalous TCP Traffic.

, , и . ISEA-ISAP, том 939 из Communications in Computer and Information Science, стр. 193-216. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Approach to Meta-Alert Generation for Anomalous TCP Traffic., , и . ISEA-ISAP, том 939 из Communications in Computer and Information Science, стр. 193-216. Springer, (2018)Threats of price scraping on e-commerce websites: attack model and its detection using neural network., и . J. Comput. Virol. Hacking Tech., 17 (1): 75-89 (2021)Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features Set., и . Int. J. Digit. Crime Forensics, 13 (6): 1-27 (2021)Multiencoder-based federated intelligent deep learning model for brain tumor segmentation., , , и . Int. J. Imaging Syst. Technol., (января 2024)Sentiment analysis: a review and comparative analysis over social media., , и . J. Ambient Intell. Humaniz. Comput., 11 (1): 97-117 (2020)A new web forensic framework for bot crime investigation., и . Digit. Investig., (2020)A New Approach for Handling Null Values in Web Server Log, , и . IJACSA - International Journal of Advanced Computer Science and Applications, 1 (July): 1--5 (2010)Analysis of Vulnerabilities in Hadoop Map Reduce Framework: A Review., , и . WCNC, том 3244 из CEUR Workshop Proceedings, стр. 1-12. CEUR-WS.org, (2022)A New Approach for Handling Null Values in Web Server Log. International Journal of Advanced Computer Science and Applications(IJACSA), (2010)