Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A probabilistic sampling method for efficient flow-based analysis., , , and . J. Commun. Networks, 18 (5): 818-825 (2016)A Fog-Based Security Framework for Large-Scale Industrial Internet of Things Environments., , , and . CoRR, (2022)A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain., , , , and . ICCCN, page 1-7. IEEE, (2022)A Drone-Based Building Inspection System Using Software-Agents., , and . IDC, volume 737 of Studies in Computational Intelligence, page 115-121. Springer, (2017)Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm., , , and . ICDCS Workshops, page 76-81. IEEE Computer Society, (2013)A Threat Hunting Framework for Industrial Control Systems., and . IEEE Access, (2021)System-Wide Anomaly Detection of Industrial Control Systems via Deep Learning and Correlation Analysis., , and . AIAI, volume 627 of IFIP Advances in Information and Communication Technology, page 362-373. Springer, (2021)The Role of Artificial Intelligence and Blockchain for Future Cyber Threat Intelligence., , , and . ICST, page 1-6. IEEE, (2023)A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS., , , , and . PerCom Workshops, page 261-266. IEEE, (2022)A two-pass approach for minimising error in synthetically generated network traffic data sets., , , , and . ACSW, page 18-27. ACM, (2023)