Author of the publication

Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.

, , , , , and . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, page 341-349. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

COR-Honeypot: Copy-On-Risk, Virtual Machine as Honeypot in the Cloud., , , , and . CLOUD, page 908-912. IEEE Computer Society, (2016)r-SVMT: Discovering the knowledge of association rule over SVM classification trees., and . IJCNN, page 2486-2493. IEEE, (2008)A federated network online network traffics analysis engine for cybersecurity., , , , and . IJCNN, page 1-8. IEEE, (2015)Incremental and decremental LDA learning with applications., , , and . IJCNN, page 1-8. IEEE, (2010)S-boxes Construction Based on Quantum Chaos and PWLCM Chaotic Mapping., , , , , and . ICCI*CC, page 1-6. IEEE, (2019)Factorizing Class Characteristics via Group MEBs Construction., , and . ICONIP (2), volume 6444 of Lecture Notes in Computer Science, page 283-290. Springer, (2010)Constructing support vector machine ensemble, , , , and . Pattern Recognition, 36 (12): 2757-2767 (2003)Spanning SVM Tree for Personalized Transductive Learning., , , and . ICANN (1), volume 5768 of Lecture Notes in Computer Science, page 913-922. Springer, (2009)Hierarchical Core Vector Machines for Network Intrusion Detection., , , , and . ICONIP (2), volume 5864 of Lecture Notes in Computer Science, page 520-529. Springer, (2009)A Novel Microarray Gene Selection Method Based on Consistency., , and . HIS, page 14. IEEE Computer Society, (2006)