Author of the publication

Visualization of Misuse-Based Intrusion Detection: Application to Honeynet Data.

, , , and . SOCO, volume 87 of Advances in Intelligent and Soft Computing, page 561-570. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-objective evolutionary optimization for dimensionality reduction of texts represented by synsets., , , , , and . PeerJ Comput. Sci., (2023)Visualization of Misuse-Based Intrusion Detection: Application to Honeynet Data., , , and . SOCO, volume 87 of Advances in Intelligent and Soft Computing, page 561-570. Springer, (2011)Short Messages Spam Filtering Using Sentiment Analysis., , and . TSD, volume 9924 of Lecture Notes in Computer Science, page 142-153. Springer, (2016)Nuevos Paradigmas de Análisis Basados en Contenidos para la Detección del Spam en RRSS.. Proces. del Leng. Natural, (2018)A study of the personalization of spam content using Facebook public information., , and . Log. J. IGPL, 25 (1): 30-41 (2017)A Mood Analysis on Youtube Comments and a Method for Improved Social Spam Detection., , , , and . HAIS, volume 10870 of Lecture Notes in Computer Science, page 514-525. Springer, (2018)Does Sentiment Analysis Help in Bayesian Spam Filtering?, , and . HAIS, volume 9648 of Lecture Notes in Computer Science, page 79-90. Springer, (2016)Novel email spam detection method using sentiment analysis and personality recognition., , , and . Log. J. IGPL, 28 (1): 83-94 (2020)Novel Comment Spam Filtering Method on Youtube: Sentiment Analysis and Personality Recognition., , , , and . ICWE Workshops, volume 10544 of Lecture Notes in Computer Science, page 228-240. Springer, (2017)Classification of SSH Anomalous Connections., , , , , , and . SOCO-CISIS-ICEUTE, volume 239 of Advances in Intelligent Systems and Computing, page 479-488. Springer, (2013)