Author of the publication

A federated network online network traffics analysis engine for cybersecurity.

, , , , and . IJCNN, page 1-8. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identify Website Personality by Using Unsupervised Learning Based on Quantitative Website Elements., , and . ICONIP (1), volume 9489 of Lecture Notes in Computer Science, page 522-530. Springer, (2015)Facial image reconstruction using polygon approximation., , , , and . SIP, page 565-569. IASTED/ACTA Press, (2005)Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition., , , and . PST, page 1-2. IEEE Computer Society, (2018)COR-Honeypot: Copy-On-Risk, Virtual Machine as Honeypot in the Cloud., , , , and . CLOUD, page 908-912. IEEE Computer Society, (2016)GRAFIX: Automated Rule-Based Post Editing System to Improve English-Persian SMT Output., , and . COLING (Posters), page 873-882. Indian Institute of Technology Bombay, (2012)A federated network online network traffics analysis engine for cybersecurity., , , , and . IJCNN, page 1-8. IEEE, (2015)Improved Language Modeling for English-Persian Statistical Machine Translation., , and . SSST@COLING, page 75-82. Coling 2010 Organizing Committee, (2010)Frown gives game away: affect sensitive systems for elementary mathematics., , , , and . SMC (1), page 13-18. IEEE, (2004)An Investigation of Factors and Measurements for Successful e-Commerce Websites., , and . WEBIST (1), page 354-360. SciTePress, (2014)Large-Scale Image Retrieval Using Local Binary Patterns and Iterative Quantization., , and . DICTA, page 1-5. IEEE, (2015)