Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Received Signal Strength Intensity Based Localization of Partial Discharge in High Voltage Systems., , , , , , , , , and . ICAC, page 1-5. IEEE, (2018)GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing., , , , and . CoRR, (2017)Machine Learning Approach for Detectionof nonTor Traffic., , , , , and . J. Cyber Secur. Mobil., 6 (2): 171-194 (2017)RAID 6 Hardware Acceleration., , and . ACM Trans. Embed. Comput. Syst., 10 (4): 43:1-43:17 (2011)A Review of Cyber-Ranges and Test-Beds: Current and Future Trends., , , , , , , , , and . Sensors, 20 (24): 7148 (2020)Utilising Flow Aggregation to Classify Benign Imitating Attacks., , , , , and . Sensors, 21 (5): 1761 (2021)Developing a Siamese Network for Intrusion Detection Systems., , , , and . EuroMLSys@EuroSys, page 120-126. ACM, (2021)Detecting Cloud Presence In Satellite Images Using The RGB-based Clip Vision-Language Model., , and . IGARSS, page 5170-5173. IEEE, (2023)Data remanence and digital forensic investigation for CUDA Graphics Processing Units., , , , , , and . IM, page 1345-1350. IEEE, (2015)Model-driven data harvesting to publish provenance for geospatial references., , , , , and . K-CAP, page 121-124. ACM, (2013)