Author of the publication

Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems.

, , , , , and . NOMS, page 1-6. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models., , and . MILCOM, page 1011-1016. IEEE, (2021)Context-aware Collaborative Neuro-Symbolic Inference in IoBTs., , , , , and . MILCOM, page 1053-1058. IEEE, (2022)Stacked Generalizations in Imbalanced Fraud Data Sets using Resampling Methods., and . CoRR, (2020)A maximum expected covering problem for locating and dispatching two classes of military medical evacuation air assets., , and . Optim. Lett., 9 (8): 1511-1531 (2015)Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework., , and . Expert Syst. Appl., (July 2023)Robust Decision-Making in the Internet of Battlefield Things Using Bayesian Neural Networks., , , and . WSC, page 1-12. IEEE, (2021)Seeing the Whole Elephant - A Comprehensive Framework for Data Education., , , , and . SIGCSE (1), page 248-254. ACM, (2024)Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets., , , , , and . BDCAT, page 58-67. IEEE, (2022)Predicting F1-Scores of Classifiers in Network Intrusion Detection Systems., , , , , and . ICCCN, page 1-6. IEEE, (2024)ACI IoT Network Traffic Dataset 2023., , , and . (April 2024)