Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying Network Properties in SRv6 based Service Function Chaining., , , and . AINTEC, page 18-26. ACM, (2021)ARP Request Trend Fitting for Detecting Malicious Activity in LAN., , , and . IMCOM, volume 935 of Advances in Intelligent Systems and Computing, page 89-96. Springer, (2019)Mining causes of network events in log data with causal inference., , and . IM, page 45-53. IEEE, (2017)Latent Variable Based Anomaly Detection in Network System Logs., , , and . IEICE Trans. Inf. Syst., 102-D (9): 1644-1652 (2019)Comparative Causal Analysis of Network Log Data in Two Large ISPs., , , , and . NOMS, page 1-6. IEEE, (2022)LogDTL: Network Log Template Generation with Deep Transfer Learning., , and . IM, page 848-853. IEEE, (2021)Towards Extracting Semantics of Network Config Blocks., , , , , and . COMPSAC, page 1443-1448. IEEE, (2021)Orientation dependence of local lattice rotations at precipitates: Example of kappa-Fe3AlC carbides in a Fe3Al-based alloy, , and . Acta Materialia, 58 (20): 6672 - 6684 (2010)Backscattering enhancement for Marshall-Palmer distributed rains for a W-band nadir-pointing radar with a finite beam width., , , and . IGARSS, page 2026-2029. IEEE, (2005)Latent Semantics Approach for Network Log Analysis: Modeling and its application., , , and . IM, page 215-223. IEEE, (2021)