Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient detection of DDoS attacks with important attributes., and . CRiSIS, page 61-67. IEEE, (2008)Detecting and Reacting against Distributed Denial of Service Attacks., , and . ICC, page 2394-2400. IEEE, (2006)Selecting Appropriate Counter-Measures in an Intrusion Detection Framework., , and . CSFW, page 78-87. IEEE Computer Society, (2004)Towards Selecting Relevant Attributes using Decision Trees for Intrusion Detection., , and . HPCNCS, page 224-230. ISRST, (2007)Constructing attribute weights from computer audit data for effective intrusion detection., , and . J. Syst. Softw., 82 (12): 1974-1981 (2009)Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures., , , , , and . CRITIS, volume 10242 of Lecture Notes in Computer Science, page 163-175. Springer, (2016)Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing., , , and . ICST Workshops, page 34-41. IEEE Computer Society, (2014)Distance Measures for Anomaly Intrusion Detection., and . Security and Management, page 17-23. CSREA Press, (2007)Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework., , , , , and . Ann. des Télécommunications, 61 (1-2): 197-217 (2006)A training-resistant anomaly detection system., , , , , and . Comput. Secur., (2018)