From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cr@ck3n: A cyber alerts visualization object., , , , , и . CyberSA, стр. 1-2. IEEE, (2017)Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre., , , , и . CSNet, стр. 1-8. IEEE, (2018)Exploring Geographical Crowd's Emotions with Twitter., , , , , и . Inf. Media Technol., 10 (2): 357-362 (2015)Cyber attacks real time detection: towards a Cyber Situational Awareness for naval systems., , , и . CyberSA, стр. 1-2. IEEE, (2019)A Human-Centred Model for Network Flow Analysis., , , и . CSNet, стр. 1-6. IEEE, (2018)A Review of Cyber-Ranges and Test-Beds: Current and Future Trends., , , , , , , , , и . Sensors, 20 (24): 7148 (2020)Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning., , , , и . CoRR, (2019)From Cyber-Security Deception to Manipulation and Gratification Through Gamification., , , , , , и . HCI (29), том 11594 из Lecture Notes in Computer Science, стр. 99-114. Springer, (2019)Holistic Approach of Integrated Navigation Equipment for Cybersecurity at Sea., , , , , , и . Cyber Science, стр. 75-86. Springer, (2022)Labelled Network Capture Generation for Anomaly Detection., , , , и . FPS, том 12056 из Lecture Notes in Computer Science, стр. 98-113. Springer, (2019)