Author of the publication

Intelligent Virtual Security System using Attention Mechanism.

, , , , , , and . EAI Endorsed Trans. Scalable Inf. Syst., 5 (16): e7 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Virtual Security System using Attention Mechanism., , , , , , and . EAI Endorsed Trans. Scalable Inf. Syst., 5 (16): e7 (2018)Information literacy and research support services in academic libraries: A bibliometric analysis from 2001 to 2020., , and . J. Inf. Sci., 49 (6): 1593-1606 (December 2023)Defeasible-PROV: Conflict Resolution in Smart Building Devices., , , and . COMPSAC, page 1013-1014. IEEE, (2023)Detecting Safety and Security Faults in PLC Systems with Data Provenance., , , and . CoRR, (2019)InstruPro: Instrumenting Programmable Logic Controller (PLC) based on Model Checking., and . SSCI, page 421-428. IEEE, (2022)OPD: Network Packet Distribution after Achieving Equilibrium to Mitigate DDOS Attack., , and . COMPSAC, page 1369-1374. IEEE, (2021)Automated synthesis of resiliency configurations for cyber networks., , , and . CNS, page 243-251. IEEE, (2016)IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems., , , and . CoRR, (2018)Performance of PCA Based Semi-supervised Learning in Face Recognition Using MPEG-7 Edge Histogram Descriptor., , , and . J. Multim., 6 (5): 404-415 (2011)IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems., , , and . IM, page 442-447. IFIP, (2019)