Author of the publication

Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism.

, , , , and . GLOBECOM, page 1-7. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards an analysis of WonGoo performance., , , and . Int. J. Pervasive Computing and Communications, 3 (2): 159-174 (2007)Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 853-862. Springer, (2005)Cyber-physical System Risk Assessment., , , , , and . IIH-MSP, page 442-447. IEEE, (2013)Building Scale-Free Overlay Mix Networks with Small-World Properties., , , , and . ICITA (2), page 529-534. IEEE Computer Society, (2005)MFBS: Multiple Factor Bandwidth Strategy Scheme for Anonymity Assessment., , , and . Symmetry, 11 (2): 203 (2019)Performance Analysis ofWonGoo System., , , and . CIT, page 716-723. IEEE Computer Society, (2005)A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms., , , and . Computer Communications, 31 (17): 4018-4025 (2008)Building lightweight intrusion detection system using wrapper-based feature selection mechanisms., , , , and . Computers & Security, 28 (6): 466-475 (2009)Next Big Thing in Big Data: The Security of the ICT Supply Chain., , , , , and . SocialCom, page 1066-1073. IEEE Computer Society, (2013)Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks., , , , , , and . IJDSN, (2014)