Author of the publication

Keystroke Presentation Attack: Generative Adversarial Networks for replacing user behaviour.

, , , and . ESSE, page 119-126. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal graph-based approach for behavioural entity classification., , , and . CoRR, (2021)Keystroke Presentation Attack: Generative Adversarial Networks for replacing user behaviour., , , and . ESSE, page 119-126. ACM, (2022)Enhancing Law Enforcement Training: A Gamified Approach to Detecting Terrorism Financing., , , , and . CoRR, (2024)Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing., , , , and . Comput. Secur., (2022)NBcoded: Network Attack Classifiers Based on Encoder and Naive Bayes Model for Resource Limited Devices., , , and . PKDD/ECML Workshops (2), volume 1525 of Communications in Computer and Information Science, page 55-70. Springer, (2021)Attacking Bitcoin anonymity: generative adversarial networks for improving Bitcoin entity classification., , , , and . Appl. Intell., 52 (15): 17289-17314 (2022)Security and 5G: Attack mitigation using Reinforcement Learning in SDN networks., , , and . FNWF, page 622-627. IEEE, (2022)Conditional Generative Adversarial Network for keystroke presentation attack., , and . CoRR, (2022)CredSSI: Enhancing Security and Privacy with Self-Sovereign Identities Approach., , , and . PerCom Workshops, page 745-750. IEEE, (2024)Cybersecurity in Public Space: Leveraging CNN and LSTM for Proactive Multivariate Time Series Classification., , , , and . IEEE Big Data, page 4110-4118. IEEE, (2023)