Author of the publication

System-Auditing, Data Analysis and Characteristics of Cyber Attacks for Big Data Systems.

, , , , , , , and . CIKM, page 4872-4876. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Secure Access to Remote Services in Mobile Environments., , and . IEEE Trans. Serv. Comput., 1 (1): 49-61 (2008)Antisocial Behavior of Agents in Scheduling Mechanisms., , and . IEEE Trans. Syst. Man Cybern. Part A, 37 (6): 946-954 (2007)Adaptation point analysis for computation migration/checkpointing., , and . SAC, page 750-751. ACM, (2005)A Scalable Asynchronous Replication-Based Strategy for Fault Tolerant MPI Applications., and . HiPC, volume 4873 of Lecture Notes in Computer Science, page 257-268. Springer, (2007)TST: An Effective Approach to Extract Trend Feature in Stock Time Series., and . ICACCI, page 120-125. IEEE, (2018)Fast scale-invariant lateral lumbar vertebrae detection and segmentation in X-ray images., , , and . EMBC, page 1054-1057. IEEE, (2016)Evaluation of cluster interconnects for a distributed shared memory., and . IPCCC, page 1-7. IEEE, (1999)Listen-while-talking: a technique for primary user protection., , and . WCNC, page 527-531. IEEE, (2009)Correlating Lab Test Results in Clinical Notes with Structured Lab Data: A Case Study in HbA1c and Glucose., , , , , , and . CRI, AMIA, (2017)Cider: A Case for Block Level Variable Redundancy on a Distributed Flash Array., , , and . ICCCN, page 1-9. IEEE, (2017)