Author of the publication

Adanomaly: Adaptive Anomaly Detection for System Logs with Adversarial Learning.

, , , , , , and . NOMS, page 1-5. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective acquaintance management for Collaborative Intrusion Detection Networks., , and . CNSM, page 158-165. IEEE, (2010)A Requirement-Oriented Design of NFV Topology by Formal Synthesis., , and . IEEE Trans. Network and Service Management, 16 (4): 1739-1753 (2019)Multi-View Permission Risk Notification for Smartphone System., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 10 (1): 42-57 (2019)Interconnecting 802.15.4 Clusters in Master-slave Mode Using Guaranteed Time Slots and Acknowledged Transfers: Queueing Theoretic Analysis., , and . J. Interconnect. Networks, 7 (1): 117-132 (2006)Network lifetime equalization in interconnected 802.15.4 clusters., , and . QSHINE, page 15. ACM, (2006)HoneyV: A virtualized honeynet system based on network softwarization., , , and . NOMS, page 1-5. IEEE, (2018)Lifetime Estimation of Large IEEE 802.15.4 Compliant Wireless Sensor Networks., and . MASCOTS, page 363-366. IEEE Computer Society, (2008)A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks., , , and . ICC, page 1-6. IEEE, (2010)Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario., , , , and . IEEE Trans. Netw. Serv. Manag., 17 (1): 118-131 (2020)An Effective Policy Sharing Mechanism for Smart Home Networks., and . CNSM, page 1-7. IEEE, (2020)