Author of the publication

The Hidden Crisis : Developing Smart Big Data pipelines to address Grand Challenges of Bridge Infrastructure health in the United States.

, , , , and . ISCRAM, ISCRAM Association, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing Threat Partitioning for More Practical Network Anomaly Detection., , , and . SACMAT, ACM, (2024)Isolation of Multiple Anonymous Attackers in Mobile Networks., and . NSS, volume 9408 of Lecture Notes in Computer Science, page 32-45. Springer, (2015)Large-Scale Realistic Network Data Generation on a Budget., , and . IRI, page 23-30. IEEE, (2018)Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack., , and . ISI, page 130-135. IEEE, (2018)Mimicking Human Behavior in Shared-Resource Computer Networks., , and . IRI, page 356-363. IEEE, (2019)The Hidden Crisis : Developing Smart Big Data pipelines to address Grand Challenges of Bridge Infrastructure health in the United States., , , , and . ISCRAM, ISCRAM Association, (2018)DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection., , and . TPS-ISA, page 217-224. IEEE, (2021)A Framework for Achieving Realism in Agent-Based Pedestrian Crowd Simulations., , and . AMCIS, Association for Information Systems, (2017)Generation of crowd arrival and destination locations/times in complex transit facilities., , , , , and . Vis. Comput., 36 (8): 1651-1661 (2020)Enhancing User Behavior Modeling via Machine Learning with Combined Text and Image Data., , and . HICSS, page 2495-2504. ScholarSpace, (2024)