Search for persons
X
?
2018 20th International Conference on Advanced Communication Technology (ICACT) ,
1
A PCA-based method for IoT network traffic anomaly detectio:
, In:
?
Crossing borders within the ABC / Faculty of Computer Science and Automation, Technische Universität Ilmenau. [Hrsg. Peter Scharff]
2
Design and deployment of a monitoring sensor for enterprise..:
, In:
?
2016 18th International Conference on Advanced Communication Technology (ICACT) ,
3
A model for network traffic anomaly detection:
, In:
?
Computational Collective Intelligence; Lecture Notes in Computer Science ,
4
Sharing Secured Data on Peer-to-Peer Applications Using Att..:
, In:
?
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications; Communications in Computer and Information Science ,
5
Applying Peer-to-Peer Networks for Decentralized Customer-t..:
, In:
?
2019 International Conference on Advanced Computing and Applications (ACOMP) ,
6
A Web-Based Management System for Software Defined Network ..:
, In:
?
Advances in Computational Collective Intelligence; Communications in Computer and Information Science ,
7
Brain Tumors Detection on MRI Images with K-means Clusterin..:
, In:
?
Progress in Landslide Research and Technology, Volume 2 Issue 1, 2023; Progress in Landslide Research and Technology ,
8
Landslide Early Warning System Based on the Empirical Appro..:
, In:
?
Advances in Engineering Research and Application; Lecture Notes in Networks and Systems ,
9
The Experimental Research on Plasma Welding of SUS 304 Stai..:
, In:
?
2022 RIVF International Conference on Computing and Communication Technologies (RIVF) ,
10
Denoising with Median and Bilateral on CT images for Liver ..:
, In:
?
IFMBE Proceedings; 7th International Conference on the Development of Biomedical Engineering in Vietnam (BME7) ,
11
Application of Near—Infrared Technique in Studying Dental L..:
, In:
?
2022 International Workshop on Intelligent Systems (IWIS) ,
13
A Vision-based Hand-sign Language Teaching System using Dee..:
, In:
?
Security, Privacy, and Anonymity in Computation, Communication, and Storage; Lecture Notes in Computer Science ,
14
Scrutinizing Trust and Transparency in Cash on Delivery Sys..:
, In:
?
Computational Science and Its Applications – ICCSA 2021; Lecture Notes in Computer Science ,
15