From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection., , , и . Complex., (2019)Detection of Cyberattacks Traces in IoT Data., , , и . J. Univers. Comput. Sci., 26 (11): 1422-1434 (2020)Common Representational Model and Ontologies for Effective Law Enforcement Solutions., , , , , , , , , и 2 other автор(ы). Vietnam. J. Comput. Sci., 7 (1): 1-18 (2020)Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project., , , , , и . ARES, стр. 65:1-65:7. ACM, (2021)Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection., , и . ARES, стр. 58:1-58:6. ACM, (2022)A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection., , , и . Sensors, 20 (16): 4583 (2020)Sensors and Pattern Recognition Methods for Security and Industrial Applications., , и . Sensors, 22 (16): 5968 (2022)How Explainable Is Explainability? Towards Better Metrics for Explainable AI., , , , и . RIIFORUM, стр. 685-695. Springer, (2023)The Methods and Approaches of Explainable Artificial Intelligence., , , и . ICCS (4), том 12745 из Lecture Notes in Computer Science, стр. 3-17. Springer, (2021)Parameters Transfer Framework for Multi-domain Fake News Detection., , , и . MobiSec, том 1644 из Communications in Computer and Information Science, стр. 85-96. Springer, (2022)