Author of the publication

A Unified Host-based Intrusion Detection Framework using Spark in Cloud.

, , and . TrustCom, page 97-103. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracking the Mobile Jammer Continuously in Time by Using Moving Vector., , , and . ISCID (1), page 43-48. IEEE, (2017)An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks., and . ICC, page 1-5. IEEE, (2010)Wiretap Channel with Information Embedding on Actions., and . Entropy, 16 (4): 2105-2130 (2014)Capacity-Equivocation Region Bounds for Degraded Broadcast Channel with Action-Dependent States., , , , and . CIT, page 263-269. IEEE Computer Society, (2014)Two Stochastic Models for Security Evaluation Based on Attack Graph., , , and . ICYCS, page 2198-2203. IEEE Computer Society, (2008)Character-Level Intrusion Detection Based On Convolutional Neural Networks., , and . IJCNN, page 1-8. IEEE, (2018)A Unified Host-based Intrusion Detection Framework using Spark in Cloud., , and . TrustCom, page 97-103. IEEE, (2020)A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection., , , , , and . ICC, page 2688-2693. IEEE, (2022)Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks., , , , , , and . IWQoS, page 1-10. IEEE, (2022)GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas., , , , , , , and . SP, page 1649-1666. IEEE, (2023)