Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physics-Guided Generative Adversarial Networks for Sea Subsurface Temperature Prediction., , , , , and . CoRR, (2021)Enhancing email classification using data reduction and disagreement-based semi-supervised learning., , and . ICC, page 622-627. IEEE, (2014)Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection., and . J. Netw. Comput. Appl., (2014)The practice on using machine learning for network anomaly intrusion detection.. ICMLC, page 576-581. IEEE, (2011)A case study: Intelligent false alarm reduction using fuzzy if-then rules in network intrusion detection., and . FSKD, page 505-509. IEEE, (2012)Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection., and . NSS, volume 7645 of Lecture Notes in Computer Science, page 1-14. Springer, (2012)Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection., and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 1-15. Springer, (2013)Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection., and . IAS, page 74-79. IEEE, (2011)Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection., , and . HPCC/EUC, page 175-182. IEEE, (2013)Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection., , and . Comput. Networks, 57 (17): 3630-3640 (2013)