Author of the publication

Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers.

, and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating the trade-off between overhead and delay for full packet traffic privacy., and . ICC Workshops, page 1345-1350. IEEE, (2013)What are you Googling? - Inferring search type information through a statistical classifier., , and . GLOBECOM, page 747-753. IEEE, (2013)A Neural Attention Model for Real-Time Network Intrusion Detection., , , and . LCN, page 291-299. IEEE, (2019)Padding and Fragmentation for Masking Packet Length Statistics., and . TMA, volume 7189 of Lecture Notes in Computer Science, page 85-88. Springer, (2012)Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques., , , and . Networking, volume 5550 of Lecture Notes in Computer Science, page 182-194. Springer, (2009)On packet loss modeling: An empirical assessment., , and . NOF, page 33-39. IEEE, (2017)ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT., , , , , , , , , and 1 other author(s). GIOTS, volume 13533 of Lecture Notes in Computer Science, page 348-359. Springer, (2022)DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback., , , and . CoRR, (2017)DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback., , , and . IEEE Trans. Inf. Forensics Secur., 13 (5): 1139-1154 (2018)Protecting traffic privacy for massive aggregated traffic., and . Comput. Networks, (2015)