From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A survey on blockchain, SDN and NFV for the smart-home security., , , , , и . Internet Things, (2022)Network Traffic Anomaly Detection and Prevention - Concepts, Techniques, and Tools, , и . Computer Communications and Networks Springer, (2017)Adversarial Impact on Anomaly Detection in Cloud Datacenters., , , и . PRDC, стр. 188-197. IEEE, (2019)An effective unsupervised network anomaly detection method., , и . ICACCI, стр. 533-539. ACM, (2012)Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach., , и . ARES, стр. 20:1-20:10. ACM, (2021)Towards Post-disaster Damage Assessment using Deep Transfer Learning and GAN-based Data Augmentation., , , и . ICDCN, стр. 372-377. ACM, (2023)Unsupervised root-cause identification of software bugs in 5G RAN., , и . CCNC, стр. 624-630. IEEE, (2022)Anomaly Detection and Resolution on the Edge: Solutions and Future Directions., , и . SOSE, стр. 227-238. IEEE, (2023)Few-Shot Anomaly Detection in Text with Deviation Learning., , , и . ICONIP (2), том 14448 из Lecture Notes in Computer Science, стр. 425-438. Springer, (2023)Survey on Incremental Approaches for Network Anomaly Detection, , и . CoRR, (2012)