Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting mobile botnets through machine learning and system calls analysis., , , , and . ICC, page 1-6. IEEE, (2017)Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-Defined Networks., , , and . IEEE Access, (2020)On the use of online clustering for anomaly detection in trace streams., , , and . SBSI, page 43:1-43:8. ACM, (2021)Recognition of Compromised Accounts on Twitter., , , and . SBSI, page 9-14. ACM, (2015)A Meta-Learning Approach for Recommendation of Image Segmentation Algorithms., , and . SIBGRAPI, page 370-377. IEEE Computer Society, (2016)Computer vision system for characterization of pasta (noodle) composition., , , , , , and . J. Electronic Imaging, 27 (05): 053021 (2018)Correlational paraconsistent machine for anomaly detection., , , , and . GLOBECOM, page 551-556. IEEE, (2014)Benchmarking Multi-target Regression Methods., , , and . BRACIS, page 396-401. IEEE Computer Society, (2018)Account classification in online social networks with LBCA and wavelets., , , , , , and . Inf. Sci., (2016)Anomaly detection using digital signature of network segment with adaptive ARIMA model and Paraconsistent Logic., , , and . ISCC, page 1-6. IEEE Computer Society, (2014)