Author of the publication

Hybrid Multi-Task Deep Learning for Improved IoT Network Intrusion Detection: Exploring Different CNN Structures.

, and . COMSNETS, page 7-12. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community., , and . SEC, volume 175 of IFIP Conference Proceedings, page 291-300. Kluwer, (2000)Security and Anonymity in Agent Systems., and . Software Agents, Agent Systems and Their Applications, volume 32 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2012)Software Agents for Computer Network Security., and . Software Agents, Agent Systems and Their Applications, volume 32 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2012)Attack Modelling and Security Evaluation for Security Information and Event Management., , and . SECRYPT, page 391-394. SciTePress, (2012)Hybridization of computational intelligence methods for attack detection in computer networks., and . J. Comput. Sci., (2017)Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 5 (3): 14-29 (2014)Systematic Literature Review of Security Event Correlation Methods., , and . IEEE Access, (2022)Social networks analysis by graph algorithms on the example of the VKontakte social network., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 10 (2): 55-75 (2019)Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects., , and . Inf., 11 (3): 168 (2020)Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions., , and . Autom. Control. Comput. Sci., 53 (8): 1029-1037 (2019)