Author of the publication

A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.

, , , , , and . IEICE Trans. Inf. Syst., 93-D (9): 2544-2554 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts., , , , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 247-253. Springer, (2007)Pipelined Parallelization in HPF Programs on the Earth Simulator., and . ISHPC, volume 4759 of Lecture Notes in Computer Science, page 365-373. Springer, (2005)Parallel Computational Complexity of Logic Programs and Alternating Turing Machines., and . FGCS, page 356-363. OHMSHA Ltd. Tokyo and Springer-Verlag, (1988)A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System., , , , and . IEICE Trans. Inf. Syst., 91-D (5): 1282-1291 (2008)Quality-aware energy routing toward on-demand home energy networking: (Position paper)., and . CCNC, page 1041-1044. IEEE, (2011)Coflow-Like Online Data Acquisition from Low-Earth-Orbit Datacenters., , , , and . IEEE Trans. Mob. Comput., 19 (12): 2743-2760 (2020)Identifying link layer home network topologies using HTIP., , , , and . CCNC, page 891-898. IEEE, (2017)Centralized Control of Account Migration at Single Sign-On in Shibboleth., and . COMPSAC, page 1597-1603. IEEE, (2020)Improving Attack Detection Performance in NIDS Using GAN., , and . COMPSAC, page 817-825. IEEE, (2020)Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach., , , , and . J. Inf. Process., 22 (3): 464-471 (2014)