Author of the publication

D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall.

, , , , and . FUZZ-IEEE, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relax, It's a Game: Utilising Gamification in Learning Agile Scrum Software Development., and . CoG, page 1-4. IEEE, (2019)Weakly Holomorphic Modular Forms in Prime Power Levels of Genus Zero., and . Integers, (2018)Urbanization, Urbanism, and Urbanity in an African City. (2013)D-FRI-CiscoFirewall: Dynamic Fuzzy Rule Interpolation for Cisco ASA Firewall., , , and . FUZZ-IEEE, page 1-6. IEEE, (2019)D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation., , , and . IEEE Trans. Emerg. Top. Comput. Intell., 5 (6): 893-907 (2021)A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems., , and . ISSE, page 1-6. IEEE, (2019)Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems., and . ISSE, page 1-6. IEEE, (2020)Analysing Cyberattacks Using Attack Tree and Fuzzy Rules., , , , , , , and . UKCI, volume 1453 of Advances in Intelligent Systems and Computing, page 364-378. Springer, (2023)Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity., and . BESC, page 1-6. IEEE, (2020)Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering., , , and . FUZZ-IEEE, page 1-6. IEEE, (2019)