Author of the publication

System-Auditing, Data Analysis and Characteristics of Cyber Attacks for Big Data Systems.

, , , , , , , and . CIKM, page 4872-4876. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptation point analysis for computation migration/checkpointing., , and . SAC, page 750-751. ACM, (2005)TST: An Effective Approach to Extract Trend Feature in Stock Time Series., and . ICACCI, page 120-125. IEEE, (2018)A Scalable Asynchronous Replication-Based Strategy for Fault Tolerant MPI Applications., and . HiPC, volume 4873 of Lecture Notes in Computer Science, page 257-268. Springer, (2007)Fast scale-invariant lateral lumbar vertebrae detection and segmentation in X-ray images., , , and . EMBC, page 1054-1057. IEEE, (2016)Evaluation of cluster interconnects for a distributed shared memory., and . IPCCC, page 1-7. IEEE, (1999)Listen-while-talking: a technique for primary user protection., , and . WCNC, page 527-531. IEEE, (2009)Cider: A Case for Block Level Variable Redundancy on a Distributed Flash Array., , , and . ICCCN, page 1-9. IEEE, (2017)Adaptive Secure Access to Remote Services in Mobile Environments., , and . IEEE Trans. Serv. Comput., 1 (1): 49-61 (2008)Antisocial Behavior of Agents in Scheduling Mechanisms., , and . IEEE Trans. Syst. Man Cybern. Part A, 37 (6): 946-954 (2007)Segmentation of lumbar vertebrae from clinical CT using active shape models and GVF-snake., , , and . EMBC, page 8033-8036. IEEE, (2011)