Author of the publication

Web Anomaly Detection Based on Frequent Closed Episode Rules.

, , , and . TrustCom/BigDataSE/ICESS, page 967-972. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain smart contracts for supply chain finance: Mapping the innovation potential in Australia-China beef supply chains., , , and . J. Ind. Inf. Integr., (2022)NNSDS: Network Nodes' Social Attributes Discovery System Based on Netflow., , , , , and . APWeb Workshophs, volume 8710 of Lecture Notes in Computer Science, page 235-245. Springer, (2014)Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices., , , , and . IEEE Access, (2019)Boosting the Robustness of Neural Networks with M-PGD., , , , , , and . ICONIP (4), volume 1791 of Communications in Computer and Information Science, page 562-573. Springer, (2022)Strengthening consumer trust in beef supply chain traceability with a blockchain-based human-machine reconcile mechanism., , , , , and . Comput. Electron. Agric., (2021)An Ontology-based Bayesian network modelling for supply chain risk propagation., , and . Ind. Manag. Data Syst., 119 (8): 1691-1711 (2019)Progress in Study of Encrypted Traffic Classification., , , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 78-86. Springer, (2012)Research and implementation on an admission control policy for temporally correlated workloads in virtual application environments., , and . CCIS, page 454-458. IEEE, (2012)Exploring blockchain-based Traceability for Food Supply Chain Sustainability: Towards a Better Way of Sustainability Communication with Consumers., , and . ISM, volume 217 of Procedia Computer Science, page 1437-1445. Elsevier, (2023)Matching Similar Functions in Different Versions of a Malware., , , , , , and . Trustcom/BigDataSE/ISPA, page 252-259. IEEE, (2016)