Author of the publication

ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks.

, and . Comput. Networks, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HB2DS: A behavior-driven high-bandwidth network mining system., and . J. Syst. Softw., (2017)ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks., and . Comput. Networks, (2020)A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios., , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 374-378. Springer, (2011)CNN-BiLSTM-Based Classification of RPL Attacks in IoT Smart Grid Networks (Industry Track)., , and . Middleware Industry, page 29-34. ACM, (2023)Database as a Service: Towards a Unified Solution for Security Requirements., , , and . COMPSAC Workshops, page 415-420. IEEE Computer Society, (2012)Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach., , , , and . ICISS, volume 7671 of Lecture Notes in Computer Science, page 343-351. Springer, (2012)DSCA: an inline and adaptive application identification approach in encrypted network traffic., , and . ICCSP, page 39-43. ACM, (2019)PASD: A Performance Analysis Approach Through the Statistical Debugging of Kernel Events., , and . SCAM, page 151-161. IEEE, (2023)Inline high-bandwidth network analysis using a robust stream clustering algorithm., and . IET Inf. Secur., 13 (5): 486-495 (2019)Toward Adaptive Tracing: Efficient System Behavior Analysis using Language Models., , and . NIER@ICSE, page 62-66. ACM, (2024)