Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A motion-based approach for real-time detection of pornographic content in videos., , , and . SAC, page 1066-1073. ACM, (2022)A Reminiscent Intrusion Detection Model Based on Deep Autoencoders and Transfer Learning., , and . GLOBECOM, page 1-6. IEEE, (2021)Improving Intrusion Detection Confidence Through a Moving Target Defense Strategy., , and . GLOBECOM, page 1-6. IEEE, (2021)Enhancing service maintainability by monitoring and auditing SLA in cloud computing., , , , , , and . Clust. Comput., 24 (3): 1659-1674 (2021)Federated learning for reliable model updates in network-based intrusion detection., , , and . Comput. Secur., (October 2023)Towards Reliable Intrusion Detection in High Speed Networks., and . SBRC Companion, page 169-176. (2019)A Host-based Intrusion Detection Model Based on OS Diversity for SCADA., , , and . IECON, page 691-696. IEEE, (2020)Towards Real-time Video Content Detection in Resource Constrained Devices., , , and . IJCNN, page 1-8. IEEE, (2020)A Non-interactive One-Time Password-Based Method to Enhance the Vault Security., , , and . AINA (4), volume 202 of Lecture Notes on Data Engineering and Communications Technologies, page 201-213. Springer, (2024)A Multi-View Intrusion Detection Model for Reliable and Autonomous Model Updates., , , and . ICC, page 1-6. IEEE, (2021)