Author of the publication

A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection.

, , , , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 191-207. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification and normalization of sentences., , , and . ICAIL, page 136-137. ACM, (1999)Power distribution automation and object-oriented agents., , , and . KES, page 297-300. IEEE, (2000)SMS-I: Intelligent Security for Cyber-Physical Systems., , , , , and . Inf., 13 (9): 403 (2022)Predictive Maintenance of home appliances: Focus on Washing Machines., , , , , , and . IECON, page 1-6. IEEE, (2021)An IoT Cloud and Big Data Architecture for the Maintenance of Home Appliances., , , , , , and . IECON, page 1-6. IEEE, (2022)A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection., , , , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 191-207. Springer, (2021)A Hybrid Approach for an Interpretable and Explainable Intrusion Detection System., , , , and . ISDA, volume 418 of Lecture Notes in Networks and Systems, page 1035-1045. Springer, (2021)Cyber Threat Monitoring Systems - Comparing Attack Detection Performance of Ensemble Algorithms., , , , , , and . CPS4CIP, volume 12618 of Lecture Notes in Computer Science, page 31-47. Springer, (2020)A Tool to Support the Investigation and Visualization of Cyber and/or Physical Incidents., , , , and . WorldCIST (4), volume 1368 of Advances in Intelligent Systems and Computing, page 130-140. Springer, (2021)A Method for Building Personalized Ontology Summaries., , and . J. Inf. Data Manag., 4 (3): 236-250 (2013)