Author of the publication

Network security and anomaly detection with Big-DAMA, a big data analytics framework.

, , , , and . CloudNet, page 16-22. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework., , , , and . ICIT, page 1179-1185. IEEE, (2019)Correlating cyber incident information to establish situational awareness in Critical Infrastructures., , , , , and . PST, page 78-81. IEEE, (2016)Combating advanced persistent threats: From network event correlation to incident detection., , , and . Comput. Secur., (2015)Establishing national cyber situational awareness through incident information clustering., , , and . CyberSA, page 1-8. IEEE, (2015)Protecting cyber physical production systems using anomaly detection to enable self-adaptation., , , , and . ICPS, page 173-180. IEEE, (2018)Network security and anomaly detection with Big-DAMA, a big data analytics framework., , , , and . CloudNet, page 16-22. IEEE, (2017)Beyond gut instincts: Understanding, rating and comparing self-learning IDSs., , , and . CyberSA, page 1. IEEE, (2015)Semi-synthetic data set generation for security software evaluation., , , and . PST, page 156-163. IEEE Computer Society, (2014)Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection., , , , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 19-36. Springer, (2018)A Collaborative Analysis System for Cross-organization Cyber Incident Handling., , , and . ICISSP, page 105-116. SciTePress, (2016)