Author of the publication

An Innovative Approach to Real-Time Concept Drift Detection in Network Security.

, , , , and . EIDWT, volume 193 of Lecture Notes on Data Engineering and Communications Technologies, page 130-139. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Events Correlation for Federated Networks Protection System., , , , and . ServiceWave, volume 6994 of Lecture Notes in Computer Science, page 100-111. Springer, (2011)Ontology Applied in Decision Support System for Critical Infrastructures Protection., , , and . IEA/AIE (1), volume 6096 of Lecture Notes in Computer Science, page 671-680. Springer, (2010)Ear Biometrics.. Encyclopedia of Biometrics, Springer US, (2015)Intersection Approach to Vulnerability Handling., , , and . WEBIST (1), page 171-174. INSTICC Press, (2010)The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good., , and . Pers. Ubiquitous Comput., 25 (5): 843-852 (2021)First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions., , , and . Pers. Ubiquitous Comput., 27 (2): 193-202 (April 2023)Practical Applications of Data Analysis, Classification and Anomaly Detection., , , and . J. Univers. Comput. Sci., 26 (4): 432-433 (2020)Hunting cyberattacks: experience from the real backbone network., , , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 13 (2): 128-146 (2022)Statistical and signal-based network traffic recognition for anomaly detection., , , and . Expert Syst. J. Knowl. Eng., 29 (3): 232-245 (2012)Comprehensive Approach to Information Sharing for increased Network Security and Survivability.. Cybern. Syst., 44 (6-7): 550-568 (2013)