Author of the publication

TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems.

, , , , , and . Future Gener. Comput. Syst., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph-based APT detection., , and . ICMCIS, page 1-8. IEEE, (2018)Training a multi-criteria decision system and application to the detection of PHP webshells., , and . ICMCIS, page 1-8. IEEE, (2019)A comparative analysis of visualisation techniques to achieve cyber situational awareness in the military., , , , , , and . ICMCIS, page 1-7. IEEE, (2018)Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems., , , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 329-339. Springer, (2021)Fast Online k-nn Graph Building., , and . CoRR, (2016)Advances in Computer Assisted Image Interpretation., and . Informatica (Slovenia), (1998)Multi-agent System for APT Detection., and . ISSRE Workshops, page 401-406. IEEE Computer Society, (2014)Virtual Language Framework (VLF) - A Semantic Abstraction Layer., and . WEBIST, page 393-398. INSTICC Press, (2009)Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems., , , , , and . CoRR, (2023)Leveraging Cyber Ranges for Prototyping, Certification and Training: The ECHO case., , , , , , , , , and 4 other author(s). CSR, page 299-304. IEEE, (2022)