Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage., , , and . IEEE Trans. Knowl. Data Eng., 26 (3): 682-697 (2014)Fast-CBUS: A fast clustering-based undersampling method for addressing the class imbalance problem., , , and . Neurocomputing, (2017)Detecting Computers in Cyber Space Maliciously Exploited as SSH Proxies., and . SECITC, volume 9522 of Lecture Notes in Computer Science, page 201-211. Springer, (2015)Security Testbed for Internet-of-Things Devices., , , , , , , and . IEEE Trans. Reliability, 68 (1): 23-44 (2019)IP2User - Identifying the Username of an IP Address in Network-Related Events., , , , , , , and . BigData Congress, page 435-436. IEEE Computer Society, (2013)Improving malware detection by applying multi-inducer ensemble., , , and . Comput. Stat. Data Anal., 53 (4): 1483-1494 (2009)Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers., , , , , and . CoRR, (2020)CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals., , , , and . CoRR, (2021)Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain., , , and . ACM Comput. Surv., 54 (5): 108:1-108:36 (2022)Mobile malware detection through analysis of deviations in application network behavior., , , , , and . Comput. Secur., (2014)