Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Continuous Authentication Framework in IoT-Enabled Environments., , , , , and . IoTSMS, page 131-138. IEEE, (2018)UMUDGA: A dataset for profiling DGA-based botnet., , and . Comput. Secur., (2020)PALOT: Profiling and Authenticating Users Leveraging Internet of Things., , , , , and . Sensors, 19 (12): 2832 (2019)CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network., , , , and . IEEE Trans. Netw. Serv. Manag., 18 (2): 1913-1924 (2021)Spotting political social bots in Twitter: A use case of the 2019 Spanish general election., , , , , , , , and . CoRR, (2020)Scalable detection of botnets based on DGA: Efficient feature discovery process in machine learning techniques., , and . Soft Comput., 24 (8): 5517-5537 (2020)Early DGA-based botnet identification: pushing detection to the edges., , and . Clust. Comput., 24 (3): 1695-1710 (2021)Screening Out Social Bots Interference: Are There Any Silver Bullets?, , , , , , and . IEEE Communications Magazine, 57 (8): 98-104 (2019)BEHACOM., , , , , , , , , and 3 other author(s). (April 2020)Spotting political social bots in Twitter: a dataset for the 2019 Spanish general election., , , , , , , , and . (May 2022)