Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Has Title" with value "An NIDS for Known and Zero-Day Anomalies". Since there have been only a few results, also nearby values are displayed.

â§Ľshowingresultsâ§˝

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • Publication:356  + (Accountable Banking Transactions)
  • Publication:360  + (Accurate Analysis of Silent Data Corruptions in Programmable AI Accelerator Microarchitectures)
  • Publication:583  + (Achieving Security and Privacy in NG-IoT using Blockchain Techniques)
  • Publication:863  + (AdaPT: Fast Emulation of Approximate DNN Accelerators in PyTorch)
  • Publication:467  + (Adapting Containerized Workloads for the Continuum Computing)
  • Publication:336  + (Adaptive Composition of Machine Learning as a Service (MLaaS) for IoT Environments)
  • Publication:146  + (Adaptive Machine Learning for Resource-Constrained Environments)
  • Publication:646  + (Addressing the Scalability Bottleneck of Semantic Technologies at Bosch)
  • Publication:313  + (Advancing Off-Road Operations: Comparative Assessment of Object Detection Methodologies)
  • Publication:871  + (Advancing SDN from OpenFlow to P4: A Survey)
  • Publication:41  + (Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic)
  • Publication:692  + (Age-optimal power allocation in industrial IoT: A risk-sensitive federated learning approach"""")
  • Publication:163  + (Agents in the computing continuum: the MLSysOps perspective)
  • Publication:305  + (Agile AI and Firmware Management in IoT: DevOps for Low-Power Microcontroller-Based Platforms)
  • Publication:641  + (Aligning Data-Aware Declarative Process Models and Event Logs)
  • Publication:461  + (Ambusher: Exploring the Security of Distributed SDN Controllers through Protocol State Fuzzing)
  • Publication:612  + (An Automated Pipeline for Advanced Fault Tolerance in Edge Computing Infrastructures)
  • Publication:139  + (An Edge/Cloud Continuum with Wearable Kinetic Energy Harvesting IoT Devices in Remote Areas)
  • Publication:627  + (An Empirical Investigation of Relevant Changes and Automation Needs in Modern Code Review)
  • Publication:614  + (An Encoder-Decoder Deep Learning Approach for Multistep Service Traffic Prediction)
  • Publication:502  + (An Enhanced Method for Objective QoE Analysis in Adaptive Streaming Services)
  • Publication:148  + (An Experimental Study of the Response Time in an Edge-Cloud Continuum with ClusterLink)
  • Publication:7  + (An Implemented Architecture for a Meta Operating System Managing Distributed Applications Across Heterogeneous Resources)
  • Publication:713  + (An Intelligent Platform for Threat Assessment and Cyber-Attack Mitigation in IoMT Ecosystems)
  • Publication:669  + (An Interactive Approach to Support Event Log Generation for Data Pipeline Discovery)
  • Publication:647  + (An SQL-Based Declarative Process Mining Framework for Analyzing Process Data Stored in Relational Databases)
  • Publication:769  + (An analytical model for loop tiling transformation)
  • Publication:812  + (An empirical characterization of software bugs in open-source Cyber Physical Systems)
  • Publication:899  + (An iterative approach for model-based requirements engineering in large collaborative projects: A detailed experience report)
  • Publication:352  + (Anomaly Detection and Resolution on the Edge: Solutions and Future Directions)
  • Publication:861  + (Anomaly detection for fault detection in wireless community networks using machine learning)
  • Publication:8  + (Anonymous Authenticated Key Exchange)
  • Publication:34  + (Another Look at Side-Channel Resistant Encoding Schemes)
  • Publication:605  + (Anticipate, Ensemble and Prune: Improving Convolutional Neural Networks via Aggregated Early Exits)
  • Publication:439  + (AnyTEE: An Open and Interoperable Software Defined TEE Framework)
  • Publication:86  + (AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions)
  • Publication:787  + (Applications of Automated Planning for Business Process Management)
  • Publication:718  + (Applying Federated Learning on Decentralized Smart Farming: A Case Study)
  • Publication:267  + (Applying Hybrid Quantum Lstm For Indoor Localization Based On Rssi)
  • Publication:745  + (Applying Model-based Requirements Engineering in Three Large European Collaborative Projects: An Experience Report)
  • Publication:2  + (Approaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial Scenario)
  • Publication:9  + (Approaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial Scenario)
  • Publication:843  + (Argumentation-Based Online Incremental Learning)
  • Publication:466  + (Assessing the Potential Energy Savings of a Fluidified Infrastructure)
  • Publication:850  + (Asymptotic Stability Analysis of Lur e Systems with Butterfly Hysteresis Nonlinearities)
  • Publication:785  + (Asynchronous Time-Sensitive Networking for 5G Backhauling)
  • Publication:497  + (At the Confluence of Artificial Intelligence and Edge Computing in IoT-Based Applications: A Review and New Perspectives)
  • Publication:866  + (Automated Design Approximation to Overcome Circuit Aging)
  • Publication:385  + (Automated Generation of Smart Contract Code from Legal Contract Specifications with Symboleo2SC)
  • Publication:824  + (Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms)