Author of the publication

A Novel Multi-Stage Approach for Hierarchical Intrusion Detection.

, , , , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 3915-3929 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Optical Content Distribution Networks for Video on Demand Services., , , , and . Photonic Netw. Commun., 11 (3): 253-263 (2006)Inter-dataset generalization strength of supervised machine learning methods for intrusion detection., , , and . J. Inf. Secur. Appl., (2020)Hierarchical feature block ranking for data-efficient intrusion detection modeling., , , , and . Comput. Networks, (2021)Analysis of an anycast based overlay system for scalable service discovery and execution., , , , , and . Comput. Networks, 54 (1): 97-111 (2010)Data transformation as a means towards dynamic data storage and polyglot persistence., , , , , and . Int. J. Netw. Manag., (2017)Software-defined network-based prioritization to avoid video freezes in HTTP adaptive streaming., , , , and . Int. J. Netw. Manag., 26 (4): 248-268 (2016)Towards distributed emergency flow prioritization in software-defined networks., , , , and . Int. J. Netw. Manag., (2021)Fog Computing: Enabling the Management and Orchestration of Smart City Applications in 5G Networks., , , and . Entropy, 20 (1): 4 (2018)Investigating Generalized Performance of Data-Constrained Supervised Machine Learning Models on Novel, Related Samples in Intrusion Detection., , , , and . Sensors, 23 (4): 1846 (February 2023)Diktyo: Network-Aware Scheduling in Container-Based Clouds., , , and . IEEE Trans. Netw. Serv. Manag., 20 (4): 4461-4477 (December 2023)