Author of the publication

Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks

, , , and . 2016 14th Annual Conference on Privacy, Security and Trust (PST), (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets, , , , and . IEEE International Conference on Communications (ICC),, (2016)This Network is Infected : HosTaGe - a Low-Interaction Honeypot for Mobile Devices, , , , , , and . Security and Privacy in Smartphones & Mobile Devices, page 43--48. (2013)Enhanced performance for the encrypted web through TLS resumption across hostnames., , , , and . ARES, page 16:1-16:10. ACM, (2020)SDN/NFV-based DDoS Mitigation via Pushback., and . ICC, page 1-6. IEEE, (2020)Enhanced Performance and Privacy for TLS over TCP Fast Open., , , , and . Proc. Priv. Enhancing Technol., 2020 (2): 271-287 (2020)Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection., , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 248-262. Springer, (2020)Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs., , and . IPCCC, page 1-11. IEEE, (2019)Enhanced Performance and Privacy for TLS over TCP Fast Open., , , , and . CoRR, (2019)Service-Based Resilience via Shared Protection in Mission-Critical Embedded Networks., , and . IEEE Trans. Netw. Serv. Manag., 18 (3): 2687-2701 (2021)Introduction to the Special Section on Recent Advances in Networks and Distributed Systems., , , and . ACM Trans. Internet Techn., 22 (4): 93:1-93:3 (November 2022)