From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Finding 3G Mobile Network Cells with Similar Radio Interface Quality Problems., , , и . EANN/AIAI (1), том 363 из IFIP Advances in Information and Communication Technology, стр. 392-401. Springer, (2011)Computer Log Anomaly Detection Using Frequent Episodes., , и . AIAI, том 296 из IFIP Advances in Information and Communication Technology, стр. 417-422. Springer, (2009)Towards holistic security management through coherent measuring., и . ECSA Companion Volume, стр. 155-161. ACM, (2010)Local anomaly detection for mobile network monitoring., и . Inf. Sci., 178 (20): 3840-3859 (2008)A Metric for Determining the Significance of Failures and Its Use in Anomaly Detection - Case Study: Mobile Network Management Data from LTE Network., и . EANN, том 517 из Communications in Computer and Information Science, стр. 171-180. Springer, (2015)Anomaly detection and classification using a metric for determining the significance of failures - Case study: mobile network management data from LTE network., и . Neural Comput. Appl., 28 (6): 1265-1275 (2017)Towards Trusted Environment in Cloud Monitoring., , и . ITNG, стр. 180-185. IEEE Computer Society, (2014)A Method for Deriving and Testing Malicious Behavior Detection Rules., и . TrustCom/BigDataSE/ISPA (1), стр. 1337-1342. IEEE, (2015)Domain Structures in Filtering Irrelevant Frequent Patterns., и . Database Support for Data Mining Applications, том 2682 из Lecture Notes in Computer Science, Springer, (2004)Analysing 3G radio network performance with fuzzy methods., , , и . Neurocomputing, (2013)