Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Traffic Anomaly Detection and Prevention - Concepts, Techniques, and Tools, , and . Computer Communications and Networks Springer, (2017)A survey on blockchain, SDN and NFV for the smart-home security., , , , , and . Internet Things, (2022)An effective unsupervised network anomaly detection method., , and . ICACCI, page 533-539. ACM, (2012)Towards Post-disaster Damage Assessment using Deep Transfer Learning and GAN-based Data Augmentation., , , and . ICDCN, page 372-377. ACM, (2023)Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach., , and . ARES, page 20:1-20:10. ACM, (2021)Unsupervised root-cause identification of software bugs in 5G RAN., , and . CCNC, page 624-630. IEEE, (2022)Few-Shot Anomaly Detection in Text with Deviation Learning., , , and . ICONIP (2), volume 14448 of Lecture Notes in Computer Science, page 425-438. Springer, (2023)Adversarial Impact on Anomaly Detection in Cloud Datacenters., , , and . PRDC, page 188-197. IEEE, (2019)Anomaly Detection and Resolution on the Edge: Solutions and Future Directions., , and . SOSE, page 227-238. IEEE, (2023)SURE-H: A Secure IoT Enabled Smart Home System., , and . WF-IoT, page 59-63. IEEE, (2019)