Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Methods for Designing Multiple Classifier Systems., , and . Multiple Classifier Systems, volume 2096 of Lecture Notes in Computer Science, page 78-87. Springer, (2001)HMM-Web: A Framework for the Detection of Attacks Against Web Applications., , and . ICC, page 1-6. IEEE, (2009)Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval., and . SSPR/SPR, volume 2396 of Lecture Notes in Computer Science, page 607-616. Springer, (2002)Network Intrusion Detection by Combining One-Class Classifiers., , and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 58-65. Springer, (2005)Dissimilarity Representation of Images for Relevance Feedback in Content-Based Image Retrieval., and . MLDM, volume 2734 of Lecture Notes in Computer Science, page 202-214. Springer, (2003)2020 Cybercrime Economic Costs: No Measure No Solution., , , , , and . ARES, page 701-710. IEEE Computer Society, (2015)DLLMiner: structural mining for malware detection., , , , and . Secur. Commun. Networks, 8 (18): 3311-3322 (2015)Reject option with multiple thresholds., , and . Pattern Recognit., 33 (12): 2099-2101 (2000)Special Issue ÄI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection"., and . Algorithms, 16 (7): 327 (July 2023)Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis., , and . IEEE Trans. Dependable Secur. Comput., 9 (5): 714-726 (2012)