Machine learning techniques for classifying network anomalies and intrusions Z Li, ALG Rios, G Xu, L Trajković 2019 IEEE international symposium on circuits and systems (ISCAS), 1-5, 2019 | 81 | 2019 |
Detecting BGP anomalies using machine learning techniques Q Ding, Z Li, P Batta, L Trajković 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2016 | 49 | 2016 |
Machine learning for detecting anomalies and intrusions in communication networks Z Li, ALG Rios, L Trajković IEEE Journal on Selected Areas in Communications 39 (7), 2254-2264, 2021 | 38 | 2021 |
Detection of denial of service attacks in communication networks ALG Rios, Z Li, K Bekshentayeva, L Trajković 2020 IEEE international symposium on circuits and systems (ISCAS), 1-5, 2020 | 38 | 2020 |
Comparison of machine learning algorithms for detection of network intrusions Z Li, P Batta, L Trajkovic 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2018 | 31 | 2018 |
Application of machine learning techniques to detecting anomalies in communication networks: Datasets and feature selection algorithms Q Ding, Z Li, S Haeri, L Trajković Cyber threat intelligence, 47-70, 2018 | 28 | 2018 |
Detecting internet worms, ransomware, and blackouts using recurrent neural networks Z Li, ALG Rios, L Trajković 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2020 | 24 | 2020 |
Evaluation of support vector machine kernels for detecting network anomalies P Batta, M Singh, Z Li, Q Ding, L Trajković 2018 IEEE International Symposium on Circuits and Systems (ISCAS), 1-4, 2018 | 24 | 2018 |
Detecting network anomalies and intrusions in communication networks ALG Rios, Z Li, G Xu, AD Alonso, L Trajković 2019 IEEE 23rd International Conference on Intelligent Engineering Systems …, 2019 | 18 | 2019 |
Global resource capacity algorithm with path splitting for virtual network embedding S Haeri, Q Ding, Z Li, L Trajković 2016 IEEE International Symposium on Circuits and Systems (ISCAS), 666-669, 2016 | 18 | 2016 |
Application of machine learning techniques to detecting anomalies in communication networks: Classification algorithms Z Li, Q Ding, S Haeri, L Trajković Cyber Threat Intelligence, 71-92, 2018 | 14 | 2018 |
Machine learning for detecting the WestRock ransomware attack using BGP routing records Z Li, ALG Rios, L Trajković IEEE Communications Magazine 61 (3), 20-26, 2022 | 11 | 2022 |
Comparison of virtualization algorithms and topologies for data center networks HB Yedder, Q Ding, U Zakia, Z Li, S Haeri, L Trajkovic 2017 26th International Conference on Computer Communication and Networks …, 2017 | 11 | 2017 |
The noise and spur delusion in fractional-N frequency synthesizer design MP Kennedy, H Mo, Z Li, G Hu, P Scognamiglio, E Napoli 2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2577-2580, 2015 | 11 | 2015 |
Comparative spur performance of a fractional-N frequency synthesizer with a nested MASH-SQ3 divider controller in the presence of memoryless piecewise-linear and polynomial … Z Li, H Mo, MP Kennedy 25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland …, 2014 | 7 | 2014 |
Classifying denial of service attacks using fast machine learning algorithms Z Li, ALG Rios, L Trajković 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2021 | 6 | 2021 |
Programmable analog frequency divider based on ρ-switching MP Kennedy, Z Li, Z Huang Nonlinear Theory and Its Applications, IEICE 4 (4), 389-399, 2013 | 5 | 2013 |
Deep echo state networks for detecting internet worm and ransomware attacks T Sharma, K Patni, Z Li, L Trajković 2023 IEEE international symposium on circuits and systems (ISCAS), 1-5, 2023 | 3 | 2023 |
Enhancing Cyber Defense: Using Machine Learning Algorithms for Detection of Network Anomalies Z Li, L Trajković 2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2023 | 1 | 2023 |
The switched injection-locked oscillator (SILO) concept Z Li, MP Kennedy IEICE Proceedings Series 1 (868), 868-871, 2012 | 1 | 2012 |