Author of the publication

On detecting and mitigating phishing attacks through featureless machine learning techniques.

, , , and . Internet Technol. Lett., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On detecting and mitigating phishing attacks through featureless machine learning techniques., , , and . Internet Technol. Lett., (2020)On the accuracy of formal verification of selective defenses for TDoS attacks., , , and . J. Log. Algebraic Methods Program., (2018)A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios., , , , , and . Sensors, 20 (11): 3078 (2020)Analysis of Security Requirements in Federated Cloud Slicing Ecosystems: A Case Study of the NECOS Platform., , and . ISCC, page 1271-1275. IEEE, (2018)NOA: A Middleware to Maximize the OpenDaylight SDN Controller Orchestration Perspectives., , , , , and . LANMAN, page 67-72. IEEE, (2018)Benchmarking of mainstream SDN controllers over open off-the-shelf software-switches., , , , and . Internet Technol. Lett., (2020)Formal Specification and Verification of a Selective Defense for TDoS Attacks., , , and . WRLA, volume 9942 of Lecture Notes in Computer Science, page 82-97. Springer, (2016)On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks., , , and . CoRR, (2017)NECOS Project: Towards Lightweight Slicing of Cloud Federated Infrastructures., , , , , , , , , and 7 other author(s). NetSoft, page 406-414. IEEE, (2018)