Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning Approach for Detectionof nonTor Traffic., , , , , and . J. Cyber Secur. Mobil., 6 (2): 171-194 (2017)Received Signal Strength Intensity Based Localization of Partial Discharge in High Voltage Systems., , , , , , , , , and . ICAC, page 1-5. IEEE, (2018)GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing., , , , and . CoRR, (2017)RAID 6 Hardware Acceleration., , and . ACM Trans. Embed. Comput. Syst., 10 (4): 43:1-43:17 (2011)A Review of Cyber-Ranges and Test-Beds: Current and Future Trends., , , , , , , , , and . Sensors, 20 (24): 7148 (2020)Utilising Flow Aggregation to Classify Benign Imitating Attacks., , , , , and . Sensors, 21 (5): 1761 (2021)Detecting Cloud Presence In Satellite Images Using The RGB-based Clip Vision-Language Model., , and . IGARSS, page 5170-5173. IEEE, (2023)Developing a Siamese Network for Intrusion Detection Systems., , , , and . EuroMLSys@EuroSys, page 120-126. ACM, (2021)Assessment of Effective Radiated Power of the Partial Discharge Emulator Source., , , , , , , , , and 2 other author(s). WISATS, volume 186 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 108-115. (2016)Model-driven data harvesting to publish provenance for geospatial references., , , , , and . K-CAP, page 121-124. ACM, (2013)