Author of the publication

SuStorID: A multiple classifier system for the protection of web services.

, , and . ICPR, page 2375-2378. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HMMPayl: an application of HMM to the analysis of the HTTP Payload., and . WAPA, volume 11 of JMLR Proceedings, page 81-87. JMLR.org, (2010)Enhancing android malware detection explainability through function call graph APIs., , , and . J. Inf. Secur. Appl., (February 2024)Design of effective neural network ensembles for image classification purposes., and . Image Vis. Comput., 19 (9-10): 699-707 (2001)Convolutional neural networks for relevance feedback in content based image retrieval., , and . Multim. Tools Appl., 79 (37-38): 26995-27021 (2020)One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time., , , , , , and . MCS, volume 9132 of Lecture Notes in Computer Science, page 168-180. Springer, (2015)IntelliAV: Toward the Feasibility of Building Intelligent Anti-malware on Android Devices., , and . CD-MAKE, volume 10410 of Lecture Notes in Computer Science, page 137-154. Springer, (2017)PowerDecode: A PowerShell Script Decoder Dedicated to Malware Analysis., , , and . ITASEC, volume 2940 of CEUR Workshop Proceedings, page 219-232. CEUR-WS.org, (2021)Selection of Classifiers Based on Multiple Classifier Behaviour., , and . SSPR/SPR, volume 1876 of Lecture Notes in Computer Science, page 87-93. Springer, (2000)Sensing Attacks in Computers Networks with Hidden Markov Models., , and . MLDM, volume 4571 of Lecture Notes in Computer Science, page 449-463. Springer, (2007)Alarm Clustering for Intrusion Detection Systems in Computer Networks., , and . MLDM, volume 3587 of Lecture Notes in Computer Science, page 184-193. Springer, (2005)