Author of the publication

Feature Engineering and Machine Learning Model Comparison for Malicious Activity Detection in the DNS-Over-HTTPS Protocol.

, , , , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection and Characterization of DDoS Attacks Using Time-Based Features., , , , , , , and . IEEE Access, (2022)Hardware architecture design for explicit model predictive control., , , and . ACC, page 1-6. IEEE, (2006)Feature Engineering and Machine Learning Model Comparison for Malicious Activity Detection in the DNS-Over-HTTPS Protocol., , , , , , and . IEEE Access, (2021)DDSP-based Singing Vocoders: A New Subtractive-based Synthesizer and A Comprehensive Evaluation., , , , , , , and . ISMIR, page 76-83. (2022)To kit or not to kit: Analysing the value of model-based kitting for additive manufacturing., , , , , , and . Comput. Ind., (2018)Fuzzy adaptive parameter control of a late acceptance hyper-heuristic., , and . UKCI, page 1-8. IEEE, (2014)Tuning a Simulated Annealing metaheuristic for cross-domain search., , and . CEC, page 1055-1062. IEEE, (2017)Move acceptance in local search metaheuristics for cross-domain search., , and . Expert Syst. Appl., (2018)Force allocation in a large-scale distributed active surface., and . IEEE Trans. Contr. Sys. Techn., 11 (5): 641-655 (2003)Constrained optimization based control of real time large-scale systems: airjet object movement system., , , , and . CDC, page 4717-4720. IEEE, (2001)