Author of the publication

Cyber Threat Monitoring Systems - Comparing Attack Detection Performance of Ensemble Algorithms.

, , , , , , and . CPS4CIP, volume 12618 of Lecture Notes in Computer Science, page 31-47. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification and normalization of sentences., , , and . ICAIL, page 136-137. ACM, (1999)Power distribution automation and object-oriented agents., , , and . KES, page 297-300. IEEE, (2000)SMS-I: Intelligent Security for Cyber-Physical Systems., , , , , and . Inf., 13 (9): 403 (2022)An IoT Cloud and Big Data Architecture for the Maintenance of Home Appliances., , , , , , and . IECON, page 1-6. IEEE, (2022)Predictive Maintenance of home appliances: Focus on Washing Machines., , , , , , and . IECON, page 1-6. IEEE, (2021)Cyber Threat Monitoring Systems - Comparing Attack Detection Performance of Ensemble Algorithms., , , , , , and . CPS4CIP, volume 12618 of Lecture Notes in Computer Science, page 31-47. Springer, (2020)A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection., , , , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 191-207. Springer, (2021)A Tool to Support the Investigation and Visualization of Cyber and/or Physical Incidents., , , , and . WorldCIST (4), volume 1368 of Advances in Intelligent Systems and Computing, page 130-140. Springer, (2021)A Hybrid Approach for an Interpretable and Explainable Intrusion Detection System., , , , and . ISDA, volume 418 of Lecture Notes in Networks and Systems, page 1035-1045. Springer, (2021)A Method for Building Personalized Ontology Summaries., , and . J. Inf. Data Manag., 4 (3): 236-250 (2013)