Author of the publication

Discovering unknown advanced persistent threat using shared features mined by neural networks.

, , , and . Comput. Networks, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PyIO: Input-Output Analysis with Python, , , and . Urban/Regional, EconWPA, (2004)Scalable Temporal Latent Space Inference for Link Prediction in Dynamic Social Networks., , , , and . IEEE Trans. Knowl. Data Eng., 28 (10): 2765-2777 (2016)Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection., , , and . IJDSN, (2015)Reg: An Ultra-Lightweight Container That Maximizes Memory Sharing and Minimizes the Runtime Environment., , , , , and . ICWS, page 76-82. IEEE, (2019)Wavelet-based sequential Monte Carlo blind receivers in fading channels with unknown channel statistics., , and . IEEE Trans. Signal Process., 52 (1): 227-239 (2004)Bayesian network loss inference., and . ICASSP (6), page 33-36. IEEE, (2003)Dynamic sensor collaboration via sequential Monte Carlo., and . IEEE J. Sel. Areas Commun., 22 (6): 1037-1047 (2004)Dawn: Co-programming Distributed Applications with Network Control., , , , and . NAI@SIGCOMM, page 14-19. ACM, (2020)Outlier Detection and Correction for Monitoring Data of Water Quality Based on Improved VMD and LSSVM., , , , , , and . Complex., (2019)Mechanism of conduction block in amphibian myelinated axon induced by biphasic electrical current at ultra-high frequency., , , , and . J. Comput. Neurosci., 31 (3): 615-623 (2011)