Author of the publication

A Cloud-based platform for the emulation of complex cybersecurity scenarios.

, , , , and . Future Gener. Comput. Syst., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PCkAD: an unsupervised intrusion detection technique exploiting within payload n-gram location distribution., , and . CoRR, (2014)Exploiting Content Spatial Distribution to Improve Detection of Intrusions., , and . ACM Trans. Internet Techn., 18 (2): 25:1-25:21 (2018)A Cloud-based platform for the emulation of complex cybersecurity scenarios., , , , and . Future Gener. Comput. Syst., (2018)An Infrastructure for Service Accountability based on Digital Identity and Blockchain 3.0., , , , and . INFOCOM Workshops, page 632-637. IEEE, (2019)A multi-protocol framework for the development of collaborative virtual environments., and . CoRR, (2014)A multi-protocol framework for the development of collaborative virtual environments., and . CSCWD, page 449-454. IEEE, (2015)A hierarchical hybrid framework for modelling anomalous behaviours., , , and . Simul. Model. Pract. Theory, (2018)TrueDetective 4.0: A Big Data Architecture for Real Time Anomaly Detection., , , , and . ISMIS, volume 13515 of Lecture Notes in Computer Science, page 449-458. Springer, (2022)Detection, Prevention and Simulation Approaches to Address Anomalies in Cyber Security., , and . SEBD, volume 2161 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Effectiveness of Content Spatial Distribution Analysis in Securing IoT Environments., , and . FiCloud, page 41-46. IEEE Computer Society, (2018)