Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the effectiveness of machine and deep learning for cyber security., , , , and . CyCon, page 371-390. IEEE, (2018)Countering Advanced Persistent Threats through security intelligence and big data analytics., , , and . CyCon, page 243-261. IEEE, (2016)The Network Perspective of Cloud Security., , , and . NCCA, page 75-82. IEEE Computer Society, (2015)Voice controlled mobile phone for car environment., , , , , , , , and . EUSIPCO, page 1-4. IEEE, (1996)Scalable architecture for online prioritisation of cyber threats., , , , and . CyCon, page 1-18. IEEE, (2017)Analysis of high volumes of network traffic for Advanced Persistent Threat detection., , , and . Comput. Networks, (2016)Evaluation of anomaly detection for in-vehicle networks through information-theoretic algorithms., , , and . RTSI, page 1-6. IEEE, (2016)Identifying malicious hosts involved in periodic communications., , , , and . NCA, page 11-18. IEEE Computer Society, (2017)DAME: A Web Oriented Infrastructure for Scientific Data Mining & Exploration, , , , , , , , , and 5 other author(s). CoRR, (2010)