Author of the publication

Hybrid Multi-Task Deep Learning for Improved IoT Network Intrusion Detection: Exploring Different CNN Structures.

, and . COMSNETS, page 7-12. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems., , , and . Future Internet, 5 (3): 355-375 (2013)Agent-based simulation of cooperative defence against botnets., , and . Concurr. Comput. Pract. Exp., 24 (6): 573-588 (2012)Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community., , and . SEC, volume 175 of IFIP Conference Proceedings, page 291-300. Kluwer, (2000)Security and Anonymity in Agent Systems., and . Software Agents, Agent Systems and Their Applications, volume 32 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2012)Software Agents for Computer Network Security., and . Software Agents, Agent Systems and Their Applications, volume 32 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2012)Attack Modelling and Security Evaluation for Security Information and Event Management., , and . SECRYPT, page 391-394. SciTePress, (2012)Methodological Primitives for Phased Construction of Data Visualization Models., , and . J. Internet Serv. Inf. Secur., 5 (4): 60-84 (2015)Computer attack modeling and security evaluation based on attack graphs., and . IDAACS, page 614-619. IEEE, (2013)Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking., , , and . ICDM, volume 8557 of Lecture Notes in Computer Science, page 39-54. Springer, (2014)Systematic Literature Review of Security Event Correlation Methods., , and . IEEE Access, (2022)