Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Manual and Automatic assigned thresholds in multi-layer data fusion intrusion detection system for 802.11 attacks., , and . IET Inf. Secur., 8 (1): 42-50 (2014)A data fusion technique to detect wireless network virtual jamming attacks., , , , , and . M&N, page 1-6. IEEE, (2015)A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection., , , , , and . IEEE Access, (2018)Automatic Dataset Labelling and Feature Selection for Intrusion Detection Systems., , and . MILCOM, page 46-51. IEEE, (2014)Fusing multi-layer metrics for detecting security attacks in 802.11 networks., , and . WTS, page 1-6. IEEE, (2011)Using Pattern-of-Life as Contextual Information for Anomaly-Based Intrusion Detection Systems., , , , and . IEEE Access, (2017)Adding contextual information to Intrusion Detection Systems using Fuzzy Cognitive Maps., , , and . CogSIMA, page 180-186. IEEE, (2016)Intrusion Detection System for Platooning Connected Autonomous Vehicles., , , , , , and . SEEDA-CECNSM, page 1-9. IEEE, (2019)Empirical study of automatic dataset labelling., , and . ICITST, page 372-378. IEEE, (2014)An on-line wireless attack detection system using multi-layer data fusion., , and . M&N, page 1-5. IEEE, (2011)