Author of the publication

Net Auto-Solver: A formal approach for automatic resolution of OpenFlow anomalies.

, , , and . LCN, page 357-360. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed learning automata for solving a classification task., , and . CEC, page 3999-4006. IEEE, (2016)An Incremental Approach for Swift OpenFlow Anomaly Detection., , and . LCN, page 502-510. IEEE, (2018)Data Mining Approaches for IP Address Clustering., , , and . INISCOM, volume 221 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 266-275. Springer, (2017)A Simple and Efficient Algorithm for Lexicon Generation Inspired by Structural Balance Theory., , , and . IEA/AIE, volume 9101 of Lecture Notes in Computer Science, page 336-347. Springer, (2015)On the Online Classification of Data Streams Using Weak Estimators., , and . IEA/AIE, volume 9799 of Lecture Notes in Computer Science, page 68-79. Springer, (2016)Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations., , , , and . RACS, page 161-166. ACM, (2020)Recovering Request Patterns to a CPU Processor from Observed CPU Consumption Data., , , , and . INISCOM, volume 188 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 14-28. (2016)On Solving the Problem of Identifying Unreliable Sensors Without a Knowledge of the Ground Truth: The Case of Stochastic Environments., , and . IEEE Trans. Cybern., 47 (7): 1604-1617 (2017)AWkS: adaptive, weighted k-means-based superpixels for improved saliency detection., , , , and . Pattern Anal. Appl., 24 (2): 625-639 (2021)An Adaptive Approach to Learning the Preferences of Users in a Social Network Using Weak Estimators., , and . J. Inf. Process. Syst., 8 (2): 191-212 (2012)