Author of the publication

A similarity based approach for application DoS attacks detection.

, , , and . ISCC, page 430-435. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profiling DNS tunneling attacks with PCA and mutual information., , , and . Logic Journal of the IGPL, 24 (6): 957-970 (2016)On the Intersection of Explainable and Reliable AI for Physical Fatigue Prediction., , , , and . IEEE Access, (2022)FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures., , , , , , and . CPS4CIP, volume 12618 of Lecture Notes in Computer Science, page 48-63. Springer, (2020)On the Feasibility of Covert Channels through Short-Message-Service., , , , and . ITASEC, volume 2940 of CEUR Workshop Proceedings, page 23-34. CEUR-WS.org, (2021)Weighted Mutual Information for Out-Of-Distribution Detection., , , , and . xAI (3), volume 1903 of Communications in Computer and Information Science, page 318-331. Springer, (2023)A similarity based approach for application DoS attacks detection., , , and . ISCC, page 430-435. IEEE Computer Society, (2013)Measuring the Energy Consumption of Cyber Security., , , and . IEEE Commun. Mag., 55 (7): 58-63 (2017)Rule-based Out-Of-Distribution Detection., , , and . CoRR, (2023)Web security and data dumping: The Cookidump case., and . Softw. Impacts, (December 2022)Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System., , , , , , , and . Sensors, 22 (2): 567 (2022)