Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing., , , , and . Comput. Secur., (2022)NBcoded: Network Attack Classifiers Based on Encoder and Naive Bayes Model for Resource Limited Devices., , , and . PKDD/ECML Workshops (2), volume 1525 of Communications in Computer and Information Science, page 55-70. Springer, (2021)Attacking Bitcoin anonymity: generative adversarial networks for improving Bitcoin entity classification., , , , and . Appl. Intell., 52 (15): 17289-17314 (2022)Security and 5G: Attack mitigation using Reinforcement Learning in SDN networks., , , and . FNWF, page 622-627. IEEE, (2022)Conditional Generative Adversarial Network for keystroke presentation attack., , and . CoRR, (2022)CredSSI: Enhancing Security and Privacy with Self-Sovereign Identities Approach., , , and . PerCom Workshops, page 745-750. IEEE, (2024)Cybersecurity in Public Space: Leveraging CNN and LSTM for Proactive Multivariate Time Series Classification., , , , and . IEEE Big Data, page 4110-4118. IEEE, (2023)SmartWarden: Automated Intrusion Detection System for Smart Contracts., , , and . BRAINS, page 51-52. IEEE, (2021)