Author of the publication

Detecting stealthy attacks against industrial control systems based on residual skewness analysis.

, , , , , and . EURASIP J. Wireless Comm. and Networking, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inter-domain routing bottlenecks and their aggravation., , , , , , and . Comput. Networks, (2019)Routing optimization with path cardinality constraints in a hybrid SDN., , , , and . Comput. Commun., (2021)An Effective Deep Neural Network for Lung Lesions Segmentation From COVID-19 CT Images., , , , , , , and . IEEE Trans. Ind. Informatics, 17 (9): 6528-6538 (2021)Dark-Point Component Analysis: Nonnegative Blind Source Separation Based on Jaccard Index., , , , and . Circuits Syst. Signal Process., 41 (7): 3985-4003 (2022)A hybrid link protection scheme for ensuring network service availability in link-state routing networks., , , , , , , and . J. Commun. Networks, 22 (1): 46-60 (2020)threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning., , , , , , , , and . CoRR, (2021)Practical Traffic-space Adversarial Attacks on Learning-based NIDSs., , , , , , , and . CoRR, (2020)Traffic Engineering in Hybrid Software Defined Network via Reinforcement Learning., , , , , , , and . J. Netw. Comput. Appl., (2021)Planning and control of mobile manipulator's operation on objects with restricted motion in intelligent environment., and . Pers. Ubiquitous Comput., 27 (3): 1369-1379 (2023)3D Model-Based Gaze Tracking Via Iris Features With a Single Camera and a Single Light Source., , , and . IEEE Trans. Hum. Mach. Syst., 51 (2): 75-86 (2021)