Author of the publication

Machine learning techniques for web intrusion detection - A comparison.

, , and . KSE, page 291-297. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Genetic Algorithm Approach for Casualty Processing Schedule., , and . HICSS, page 1-9. ScholarSpace, (2022)Machine learning techniques for web intrusion detection - A comparison., , and . KSE, page 291-297. IEEE, (2016)udCATS: A Comprehensive Unsupervised Deep Learning Framework for Detecting Collective Anomalies in Time Series., , , and . RICE, volume 33 of Annals of Computer Science and Information Systems, page 201-206. (2022)A Zero-Shot Deep Learning Approach for Unknown IoT Botnet Attack Detection., , , and . RIVF, page 278-283. IEEE, (2023)A hybrid framework for prediction problem in large collections of short time series.. Bundeswehr University Munich, Neubiberg (Munich), Germany, (2020)A concise review of AI-based solutions for mass casualty management., , , , and . CITRisk, volume 2805 of CEUR Workshop Proceedings, page 222-132. CEUR-WS.org, (2020)Generating artificial attack data for intrusion detection using machine learning., , and . SoICT, page 286-291. ACM, (2014)Modeling The Causes Of Terrorism From Media News: An Innovative Framework Connecting Impactful Events With Terror Incidents., and . KSE, page 364-369. IEEE, (2018)Resource Optimization in Mass Casualty Management: A Comparison of Methods., , , , and . OR, page 415-420. Springer, (2021)Machine Learning in Vehicle Travel Time Estimation: A Brief Technological Perspective and Review., , , , and . HICSS, page 1409-1414. ScholarSpace, (2024)