Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking Bitcoin anonymity: generative adversarial networks for improving Bitcoin entity classification., , , , and . Appl. Intell., 52 (15): 17289-17314 (2022)Security and 5G: Attack mitigation using Reinforcement Learning in SDN networks., , , and . FNWF, page 622-627. IEEE, (2022)NBcoded: Network Attack Classifiers Based on Encoder and Naive Bayes Model for Resource Limited Devices., , , and . PKDD/ECML Workshops (2), volume 1525 of Communications in Computer and Information Science, page 55-70. Springer, (2021)Kriptosare.gen, a Dockerized Bitcoin Testbed: Analysis of Server Performance., , , , and . NTMS, page 1-5. IEEE, (2019)Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing., , , , and . Comput. Secur., (2022)Temporal Analysis of Distribution Shifts in Malware Classification for Digital Forensics., , and . EuroS&P Workshops, page 439-450. IEEE, (2023)ChronoEOS: Configuration Control System Based on EOSIO Blockchain for On-Running Forensic Analysis., , , and . BLOCKCHAIN, volume 595 of Lecture Notes in Networks and Systems, page 37-47. Springer, (2022)Conditional Generative Adversarial Network for keystroke presentation attack., , and . CoRR, (2022)Temporal graph-based approach for behavioural entity classification., , , and . CoRR, (2021)Verification system based on long-range iris and Graph Siamese Neural Networks., , , , and . ESSE, page 80-88. ACM, (2022)