Author of the publication

A Real-Time Non-Invasive Anomaly Detection Technique for Cooling Systems.

, and . EI.A, volume 14467 of Lecture Notes in Computer Science, page 135-151. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demystifying Blockchain in 5G and Beyond Technologies.. J. Mobile Multimedia, 18 (5): 1379-1398 (2022)OCSRL: An Model-Based Reinforcement Learning Approach to Optimize Energy Consumption of Cooling Systems., and . e-Science, page 1-10. IEEE, (2023)Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy., , , , and . IC3I, page 513-519. IEEE, (2023)Investigating Patterns of UAV Attacks for Building Secure UAV Network., , and . IC3I, page 136-141. IEEE, (2023)A Real-Time Non-Invasive Anomaly Detection Technique for Cooling Systems., and . EI.A, volume 14467 of Lecture Notes in Computer Science, page 135-151. Springer, (2023)MaOC: Model-Assisted Optimal Control for Ductless-Split Cooling Systems in Building Environments., and . COMSNETS, page 790-797. IEEE, (2024)Improving Imbalanced Data Classification Through Integrated Data-Level and Algorithm-Level Techniques., , , , and . IC3I, page 442-449. IEEE, (2023)An electronic warfare approach for deploying a software-based Wi-Fi jammer., , and . IC3I, page 43-47. IEEE, (2022)Employing Convolutional Neural Network for IoT Healthcare Attack Detection in Intensive Care Unit., , , and . IC3I, page 798-803. IEEE, (2023)An Energy Consumption Dataset for Ductless-split Cooling Systems to Train Large Models., and . BuildSys@SenSys, page 216-219. ACM, (2023)