Author of the publication

Robust consensus-based network intrusion detection in presence of Byzantine attacks.

, , , and . SoICT, page 278-285. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preparation and optimization of a diverse workload for a large-scale heterogeneous system., , , , , , , , , and 69 other author(s). SC, page 32:1-32:17. ACM, (2019)Robust consensus-based network intrusion detection in presence of Byzantine attacks., , , and . SoICT, page 278-285. ACM, (2016)Understanding the Wine Judges and Evaluating the Consistency Through White-Box Classification Algorithms., , , and . ICDM, volume 9728 of Lecture Notes in Computer Science, page 239-252. Springer, (2016)Spares Optimization for the Lockheed Martin Joint Strike Fighter., , , , , and . Winter Simulation Conference, page 14. IEEE Computer Society, (2004)Collaborative Learning in Cloud-based Virtual Computer Labs., , , and . FIE, page 1-5. IEEE, (2018)A Wineinformatics Study for White-box Classification Algorithms to Understand and Evaluate Wine Judges., , , and . Trans. MLDM, 10 (1): 3-24 (2017)Association rule hiding in risk management for retail supply chain collaboration., , , and . Computers in Industry, 64 (7): 776-784 (2013)Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation., , and . Signal Processing, (2014)Large capacity optical networks applying multi-stage hetero-granular optical path routing., , and . Optical Switching and Networking, (2014)Spectral sensitivity of LSP parameters and their transformed coefficients., and . EUROSPEECH, ISCA, (1997)