Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature Analysis for ML-based IIoT Intrusion Detection., , and . CoRR, (2021)An Explainable Machine Learning-based Network Intrusion Detection System for Enabling Generalisability in Securing IoT Networks., , and . CoRR, (2021)Exploring edge TPU for network intrusion detection in IoT., , , , and . J. Parallel Distributed Comput., (September 2023)DOC-NAD: A Hybrid Deep One-class Classifier for Network Anomaly Detection., , , , and . CCGridW, page 1-7. IEEE, (2023)Graph Neural Network-based Android Malware Classification with Jumping Knowledge., , , , and . DSC, page 1-9. IEEE, (2022)E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT., , , , and . NOMS, page 1-9. IEEE, (2022)Exploring Edge TPU for Network Intrusion Detection in IoT., , , , and . CoRR, (2021)Towards a Standard Feature Set for Network Intrusion Detection System Datasets., , and . Mob. Networks Appl., 27 (1): 357-370 (2022)Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-Based Network Intrusion Detection., , and . Big Data Res., (2022)From zero-shot machine learning to zero-day attack detection., , , and . Int. J. Inf. Sec., 22 (4): 947-959 (2023)