Author of the publication

Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier.

, , , , , , and . ISNN (3), volume 3498 of Lecture Notes in Computer Science, page 476-481. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated generation of ham rules for Vietnamese spam filtering., , and . CISDA, page 1-5. IEEE, (2014)Personalized Email User Action Prediction Based on SpamAssassin., , and . ICCASA, volume 193 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 161-171. (2016)A Multi-objective Approach for Vietnamese Spam Detection., , , and . KSE (2), volume 245 of Advances in Intelligent Systems and Computing, page 211-221. Springer, (2013)Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks., , , , and . Wireless Networks, 25 (4): 1477-1489 (2019)Predicting user's action on emails: improvement with ham rules and real-world dataset., , and . KSE, page 169-174. IEEE, (2018)A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays., , and . TrustCom, page 201-208. IEEE Computer Society, (2012)User Preference-Based Spamming Detection with Coupled Behavioral Analysis., , and . SpaCCS, volume 10066 of Lecture Notes in Computer Science, page 466-477. (2016)Design of prosthetic hand controlled by real-time EMG signal acquisition., , , and . ICCAIS, page 34-38. IEEE, (2023)The classification of optical coherence tomography images using machine learning for macular hole and diabetic macular edema diagnoses., , , and . ICCAIS, page 634-638. IEEE, (2023)Evolving Block-Based Neural Network and Field Programmable Gate Arrays for Host-Based Intrusion Detection System., , and . KSE, page 86-92. IEEE Computer Society, (2012)