Author of the publication

Shining New Light on Useful Features for Network Intrusion Detection Algorithms.

, , , and . CCNC, page 369-377. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded Systems., , and . DSN, page 227-238. IEEE Computer Society, (2016)Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device Firmware., , , , , and . CCWC, page 467-473. IEEE, (2024)Survey of Automotive Controller Area Network Intrusion Detection Systems., , , and . IEEE Des. Test, 36 (6): 48-55 (2019)Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network., , , , , , and . AutoSec@CODASPY, page 25-30. ACM, (2019)LockDown: an operating system for achieving service continuity by quarantining principals., , and . EUROSEC, page 7:1-7:6. ACM, (2016)Optimized event notification in CAN through in-frame replies and Bloom filters., , , , and . WFCS, page 1-10. IEEE, (2017)Shared hardware data structures for hard real-time systems., , , and . EMSOFT, page 133-142. ACM, (2012)Harmonizing ARINC 653 and Realtime POSIX for Conformance to the FACE Technical Standard., and . ISORC, page 98-105. IEEE, (2020)Survey of Interoperability Challenges in the Internet of Vehicles., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (12): 22838-22861 (2022)L-IDS: A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks., , and . IoTDI, page 464-465. ACM, (2023)