Author of the publication

Anomaly-based Fault Detection System in Distributed System.

, and . SERA, page 782-789. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of fluoroscopic registration in spinal neuronavigation., , , , , , , , and . CARS, volume 1230 of International Congress Series, page 1236-1238. Elsevier, (2001)The Virtual Computing Environment., , , and . HPDC, page 7-14. IEEE, (1994)Design and Evaluation of an Adaptive Communication System for High Peformance Distributed Computing Applications., , and . PDPTA, CSREA Press, (2000)Autonomic and Integrated Management for Proactive Cyber Security (AIM-PSC)., and . UCC (Companion"), page 107-112. ACM, (2017)Static Versus Dynamic Data Information Fusion Analysis Using DDDAS for Cyber Security Trust., , and . ICCS, volume 29 of Procedia Computer Science, page 1299-1313. Elsevier, (2014)Plug & execute framework for network traffic generation., , and . CSIIRW, page 49. ACM, (2010)Vulnerability Analysis of Faults/Attacks in Network Centric Systems., , , , and . PDCS, page 256-261. ISCA, (2003)Machine Learning for Intrusion Detection: Stream Classification Guided by Clustering for Sustainable Security in IoT., , , and . ACM Great Lakes Symposium on VLSI, page 691-696. ACM, (2023)Value of service based resource management for large-scale computing systems., , , , , , and . Clust. Comput., 20 (3): 2013-2030 (2017)An explainable and efficient deep learning framework for video anomaly detection., , , , and . Clust. Comput., 25 (4): 2715-2737 (2022)