From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Model Generalization for Intrusion Detection: Unsupervised Machine Learning Techniques., , , , и . J. Netw. Syst. Manag., 30 (1): 12 (2022)Performance Impact of Queue Sorting in Container-Based Application Scheduling., , , , , и . CNSM, стр. 1-9. IEEE, (2023)Task Assignment and Capacity Allocation for ML-Based Intrusion Detection as a Service in a Multi-Tier Architecture., , , , , , , и . IEEE Trans. Netw. Serv. Manag., 20 (1): 672-683 (марта 2023)Discovering Non-Metadata Contaminant Features in Intrusion Detection Datasets., , , , и . PST, стр. 1-11. IEEE, (2022)Machine learning based intrusion detection as a service: task assignment and capacity allocation in a multi-tier architecture., , , , , , , и . UCC Companion, стр. 27:1-27:6. ACM, (2021)Unsupervised Machine Learning Techniques for Network Intrusion Detection on Modern Data., , , , и . CSNet, стр. 1-8. IEEE, (2020)Hierarchical feature block ranking for data-efficient intrusion detection modeling., , , , и . Comput. Networks, (2021)Investigating Generalized Performance of Data-Constrained Supervised Machine Learning Models on Novel, Related Samples in Intrusion Detection., , , , и . Sensors, 23 (4): 1846 (февраля 2023)Castles Built on Sand: Observations from Classifying Academic Cybersecurity Datasets with Minimalist Methods., , , , и . IoTBDS, стр. 61-72. SCITEPRESS, (2023)A Novel Multi-Stage Approach for Hierarchical Intrusion Detection., , , , , , и . IEEE Trans. Netw. Serv. Manag., 20 (3): 3915-3929 (сентября 2023)