From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process., , , и . Secur. Commun. Networks, 9 (16): 3483-3495 (2016)Multi-Tenant Intrusion Detection Framework as a Service for SaaS., , , и . IEEE Trans. Serv. Comput., 15 (5): 2925-2938 (2022)Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability., , , и . IEEE Trans. Cloud Computing, 7 (2): 314-328 (2019)TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network., , , и . Trans. Emerg. Telecommun. Technol., (2022)Independent and Identically Distributed (IID) Data Assessment in Federated Learning., , , , , и . GLOBECOM, стр. 293-298. IEEE, (2022)ModularFed: Leveraging Modularity in Federated Learning Frameworks., , , , , и . CoRR, (2022)Combining heterogeneous anomaly detectors for improved software security., , , и . J. Syst. Softw., (2018)An anomaly detection system based on variable N-gram features and one-class SVM., , , и . Inf. Softw. Technol., (2017)ITADP: An inter-tenant attack detection and prevention framework for multi-tenant SaaS., , и . J. Inf. Secur. Appl., (2019)P-Code Based Classification to Detect Malicious VBA Macro., и . ISNCC, стр. 1-6. IEEE, (2020)