Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Multilayer Perceptron in Computer Security to Improve Intrusion Detection., , , and . IIMSS, volume 76 of Smart Innovation, Systems and Technologies, page 210-219. Springer, (2017)Data Mining in Social Network., , , , , and . IIMSS, volume 98 of Smart Innovation, Systems and Technologies, page 53-63. Springer, (2018)Multimedia Social Network Modeling using Hypergraphs., , , and . Int. J. Multim. Data Eng. Manag., 7 (3): 53-77 (2016)Centrality in heterogeneous social networks for lurkers detection: An approach based on hypergraphs., , , , and . Concurr. Comput. Pract. Exp., (2018)Model transformations of MapReduce Design Patterns for automatic development and verification., and . J. Parallel Distributed Comput., (2017)A semantic-based methodology for digital forensics analysis., , , and . J. Parallel Distributed Comput., (2020)CAN-Bus Attack Detection With Deep Learning., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (8): 5081-5090 (2021)An Intelligent Conversational Agent for the Legal Domain., , , and . Inf., 14 (6): 307 (2023)Detect and correlate information system events through verbose logging messages analysis., , , and . Computing, 101 (7): 819-830 (2019)Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services., , , , and . IEEE Internet Things J., 7 (5): 4655-4665 (2020)