From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Castles Built on Sand: Observations from Classifying Academic Cybersecurity Datasets with Minimalist Methods., , , , и . IoTBDS, стр. 61-72. SCITEPRESS, (2023)In-depth Comparative Evaluation of Supervised Machine Learning Approaches for Detection of Cybersecurity Threats., , , и . IoTBDS, стр. 125-136. SciTePress, (2019)Unsupervised Machine Learning Techniques for Network Intrusion Detection on Modern Data., , , , и . CSNet, стр. 1-8. IEEE, (2020)Machine learning based intrusion detection as a service: task assignment and capacity allocation in a multi-tier architecture., , , , , , , и . UCC Companion, стр. 27:1-27:6. ACM, (2021)Classification Hardness for Supervised Learners on 20 Years of Intrusion Detection Data., , , и . IEEE Access, (2019)Performance Impact of Queue Sorting in Container-Based Application Scheduling., , , , , и . CNSM, стр. 1-9. IEEE, (2023)Towards Model Generalization for Intrusion Detection: Unsupervised Machine Learning Techniques., , , , и . J. Netw. Syst. Manag., 30 (1): 12 (2022)Characterizing the Impact of Data-Damaged Models on Generalization Strength in Intrusion Detection., , , , и . J. Cybersecur. Priv., 3 (2): 118-144 (апреля 2023)Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models., , , , и . DIMVA, том 13358 из Lecture Notes in Computer Science, стр. 23-41. Springer, (2022)Discovering Non-Metadata Contaminant Features in Intrusion Detection Datasets., , , , и . PST, стр. 1-11. IEEE, (2022)