Author of the publication

Using recurrent neural networks toward black-box system anomaly prediction.

, , , , , and . IWQoS, page 1-10. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks., , , and . IEEE Journal on Selected Areas in Communications, 30 (11): 2220-2230 (2012)Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks., , and . IEEE Trans. Network and Service Management, 9 (3): 320-332 (2012)Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks., , , and . IEEE Trans. Network and Service Management, 8 (2): 79-91 (2011)Design and management of collaborative intrusion detection networks., and . IM, page 955-961. IEEE, (2013)Enhancing Twitter spam accounts discovery using cross-account pattern mining., , and . IM, page 491-496. IEEE, (2015)A game-theoretic approach to rule sharing mechanism in networked intrusion detection systems: Robustness, incentives and security., , , and . CDC-ECE, page 243-248. IEEE, (2011)Poster: SMURFEN: a rule sharing collaborative intrusion detection network., , , and . ACM Conference on Computer and Communications Security, page 761-764. ACM, (2011)A game-theoretic model for defending against malicious users in RecDroid., and . IM, page 1339-1344. IEEE, (2015)ENSC: Multi-Resource Hybrid Scaling for Elastic Network Service Chain in Clouds., , , , and . ICPADS, page 34-41. IEEE, (2018)Guest Editorial: Special issue on Next Generation Networks and Systems Security., and . J. Internet Serv. Inf. Secur., 5 (2): 1-3 (2015)