Author of the publication

Poster Abstract: An Unsupervised Two-Layer Multi-Step Network Attack Detector.

, , , and . INFOCOM Workshops, page 1308-1309. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can Longest Prefix Matching Make The Path Length Shorter?, , , and . JDCTA, 4 (8): 172-181 (2010)threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning., , , , , , , , and . CoRR, (2021)Practical Traffic-space Adversarial Attacks on Learning-based NIDSs., , , , , , , and . CoRR, (2020)Traffic Engineering in Hybrid Software Defined Network via Reinforcement Learning., , , , , , , and . J. Netw. Comput. Appl., (2021)Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Sectional anatomic study on otorhinolaryngology structures., , , , , and . CARS, volume 1268 of International Congress Series, page 1302. Elsevier, (2004)Inter-domain routing bottlenecks and their aggravation., , , , , , and . Comput. Networks, (2019)A Survey on Network Verification and Testing With Formal Methods: Approaches and Challenges., , , , , , , and . IEEE Commun. Surv. Tutorials, 21 (1): 940-969 (2019)基于增量最短路径优先的域内高效路由保护算法 (Efficient Intra-domain Routing Protection Algorithm Based on i-SPF)., and . 计算机科学, 46 (8): 116-120 (2019)