Author of the publication

Soter: Deep Learning Enhanced In-Network Attack Detection Based on Programmable Switches.

, , , , , , , , and . SRDS, page 225-236. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved whale optimisation algorithm for distributed assembly flow shop with crane transportation., , , , and . Int. J. Autom. Control., 15 (6): 710-743 (2021)Kinase-Bench: Comprehensive Benchmarking Tools and Guidance for Achieving Selectivity in Kinase Drug Discovery., , , , , , , , , and 11 other author(s). J. Chem. Inf. Model., 64 (24): 9528-9550 (2024)Reservation-Based Distributed Collision Avoidance Channel Access Scheme for WLAN.. GLOBECOM, page 5340-5344. IEEE, (2008)Fuzzy comprehensive evaluation on food safety culture level in enterprise., and . FSKD, page 530-534. IEEE, (2015)An Experimental System for Conceptual Evolution in Object Databases., , and . Australian Database Conference, page 19-43. World Scientific, (1990)Toward ultimate miniaturization of high Q silicon traveling-wave microresonators, , , and . Optics Express, 18 (19): 19541 (August 2010)Level-set based topology optimization for electromagnetic dipole antenna design, , and . Journal of Computational Physics, 229 (19): 6915--6930 (2010)An Iterative Approach for Rules and Data Allocation in Distributed Deductive Database Systems., , and . CIKM, page 356-363. ACM, (1998)A Dynamic Data Model for a Video Database Management System., and . ACM Comput. Surv., 27 (4): 602-606 (1995)Optimal frame synchronization for DVB-S2., , , , , and . ISCAS, page 956-959. IEEE, (2008)