Author of the publication

Denial of Service Attack Detection Based on Feature Extraction and Supervised Techniques.

, , , , , and . DCAI (2), volume 585 of Lecture Notes in Networks and Systems, page 59-68. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A distributed topology for identifying anomalies in an industrial environment., , , , , , , and . Neural Comput. Appl., 34 (23): 20463-20476 (2022)Comparative Study of Wastewater Treatment Plant Feature Selection for COD Prediction., , , , , , , and . DCAI (3), volume 742 of Lecture Notes in Networks and Systems, page 11-20. Springer, (2023)Hybrid Classification Model Based on Supervised Techniques for Denial of Service Attacks Detection over CoAP Protocol., , , , , , , and . DCAI (3), volume 742 of Lecture Notes in Networks and Systems, page 1-10. Springer, (2023)A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport., , , , , , , and . Expert Syst. J. Knowl. Eng., (February 2024)A novel method for anomaly detection using beta Hebbian learning and principal component analysis., , , , , , and . Log. J. IGPL, 31 (2): 390-399 (March 2023)Low Cost Three-Phase Motor Speed Control System Design for Educational Laboratory Practices., , , , , and . CISIS-ICEUTE, volume 1400 of Advances in Intelligent Systems and Computing, page 315-324. Springer, (2021)3D Virtual Laboratory for Control Engineering Using Blended Learning Methodology., , , , , , and . CISIS-ICEUTE, volume 532 of Lecture Notes in Networks and Systems, page 256-265. Springer, (2022)Denial of Service Attack Detection Based on Feature Extraction and Supervised Techniques., , , , , and . DCAI (2), volume 585 of Lecture Notes in Networks and Systems, page 59-68. Springer, (2022)System Identification and Emulation of a Physical Level Control Plant Using a Low Cost Embedded System., , , , , , , and . CISIS-ICEUTE, volume 748 of Lecture Notes in Networks and Systems, page 238-247. Springer, (2023)Detection of Denial of Service Attacks in an MQTT Environment Using a One-Class Approach., , , , , , , , , and . CISIS-ICEUTE, volume 1400 of Advances in Intelligent Systems and Computing, page 84-93. Springer, (2021)