Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Incidence Management in 5G Based on Situational Awareness., , , , and . Future Internet, 9 (1): 3 (2017)Reasoning and Knowledge Acquisition Framework for 5G Network Analytics., , and . Sensors, 17 (10): 2405 (2017)A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation., , and . ARES, page 48:1-48:10. ACM, (2018)A Bio-Inspired Reaction Against Cyberattacks: AIS-Powered Optimal Countermeasures Selection., , and . IEEE Access, (2021)Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics., , and . Sensors, 20 (16): 4501 (2020)Network Intrusion Detection Systems in Data Centers., , and . Handbook on Data Centers, Springer, (2015)Online masquerade detection resistant to mimicry., , and . Expert Syst. Appl., (2016)Alert correlation framework for malware detection by anomaly-based packet payload analysis., , and . J. Netw. Comput. Appl., (2017)A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences., , and . Knowl. Based Syst., (2018)A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences., , and . CoRR, (2024)