Author of the publication

A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts.

, , , , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 247-253. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and evaluation of smartphone-based human activity recognition using a neural network approach., , and . IJCNN, page 1-5. IEEE, (2015)E-Quality for Manufacturing (EQM) Within the Framework of Internet-Based Systems., and . IEEE Trans. Syst. Man Cybern. Part C, 37 (6): 1365-1372 (2007)Interoperable augmented web browsing for exploring virtual media in real space., , , and . LocWeb, page 7. ACM, (2009)Using a design structure matrix to support technology roadmapping for product-service systems., , , and . Technol. Anal. Strateg. Manag., 30 (3): 337-350 (2018)Hybrid beamformer design for mmwave wideband multi-user MIMO-OFDM systems : (Invited paper)., , and . SPAWC, page 1-5. IEEE, (2017)ENInst: Enhancing weakly-supervised low-shot instance segmentation., , , , and . Pattern Recognit., (January 2024)A User Movement Direction Detecting Method through Data Analysis of BLE Beacons and Its Implementation., and . KSII Trans. Internet Inf. Syst., 13 (10): 4908-4922 (2019)Practical Denoising Autoencoder for CSI Feedback Without Clean Target in Massive MIMO Networks., , , , and . IEEE Wirel. Commun. Lett., 13 (2): 525-529 (February 2024)A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System., , , and . DASFAA, volume 4443 of Lecture Notes in Computer Science, page 140-151. Springer, (2007)Localization Uncertainty Estimation for Anchor-Free Object Detection., , , , , , and . ECCV Workshops (8), volume 13808 of Lecture Notes in Computer Science, page 27-42. Springer, (2022)