Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A look into the information your smartphone leaks., , , and . ISNCC, page 1-6. IEEE, (2017)Multi-Stage Attack Detection Using Contextual Information., , , , and . MILCOM, page 1-9. IEEE, (2018)A Live System for Wavelet Compression of High Speed Computer Network Measurements., and . PAM, volume 4427 of Lecture Notes in Computer Science, page 241-244. Springer, (2007)Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems., , , , and . ICC, page 1-7. IEEE, (2017)Semi-Edge: From Edge Caching to Hierarchical Caching in Network Fog., , and . EdgeSys@MobiSys, page 43-48. ACM, (2018)Detecting misbehaviour in WiFi using multi-layer metric data fusion., , and . M&N, page 155-160. IEEE, (2013)Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats., , , , , , and . IEEE Access, (2019)Denial of service detection using dynamic time warping., , , , , and . Int. J. Netw. Manag., (2021)Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks., , and . Future Gener. Comput. Syst., (2020)Anomaly Detection Using Dynamic Time Warping., , , , , and . CSE/EUC, page 193-198. IEEE, (2019)