Author of the publication

A Proposal of Algorithm for Web Applications Cyber Attack Detection.

, , , and . CISIM, volume 8838 of Lecture Notes in Computer Science, page 680-687. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proposal of Algorithm for Web Applications Cyber Attack Detection., , , and . CISIM, volume 8838 of Lecture Notes in Computer Science, page 680-687. Springer, (2014)Digital Analysis of 2D Code Images Based on Radon Transform., and . Computer Recognition Systems 3, volume 57 of Advances in Intelligent and Soft Computing, Springer, (2009)Human Lips Recognition.. Computer Recognition Systems 2, volume 45 of Advances in Soft Computing, Springer, (2008)Q-Rapids framework for advanced data analysis to improve rapid software development., , , and . J. Ambient Intell. Humaniz. Comput., 10 (5): 1927-1936 (2019)Towards Mobile Palmprint Biometric System with the New Palmprint Database., , , and . IP&C, volume 1062 of Advances in Intelligent Systems and Computing, page 149-157. Springer, (2019)Image Pre-classification for Biometrics Identification Systems.. Advances in Information Processing and Protection, Springer, (2007)Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model., , , and . SOCO-CISIS-ICEUTE, volume 299 of Advances in Intelligent Systems and Computing, page 545-554. Springer, (2014)Switching Network Protocols to Improve Communication Performance in Public Clouds., , and . IP&C, volume 892 of Advances in Intelligent Systems and Computing, page 224-236. Springer, (2018)Network Event Correlation and Semantic Reasoning for Federated Networks Protection System., and . CISIM, volume 245 of Communications in Computer and Information Science, page 48-54. Springer, (2011)New solutions for exposing clustered applications deployed in the cloud., , and . Clust. Comput., 22 (3): 829-838 (2019)