Author of the publication

Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems.

, , , , and . ICC, page 1-7. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Dataset Labelling and Feature Selection for Intrusion Detection Systems., , and . MILCOM, page 46-51. IEEE, (2014)Evidential classification for defending against adversarial attacks on network traffic., , and . Inf. Fusion, (April 2023)Automated Detection of Changes in Computer Network Measurements using Wavelets., and . ICCCN, page 1223-1227. IEEE, (2007)A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection., , , , , and . IEEE Access, (2018)A data fusion technique to detect wireless network virtual jamming attacks., , , , , and . M&N, page 1-6. IEEE, (2015)Evidential classification and feature selection for cyber-threat hunting., , and . Knowl. Based Syst., (2021)Detecting Signalling DoS Attacks on LTE Networks., , , and . INISCOM, volume 293 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 283-301. Springer, (2019)Compressing Computer Network Measurements Using Embedded Zerotree Wavelets., and . AICT, page 188-193. IEEE Computer Society, (2009)A Framework for Cross-Layer Measurements in Wireless Networks., , and . AICT, page 237-242. IEEE Computer Society, (2009)A Live System for Wavelet Compression of High Speed Computer Network Measurements., and . PAM, volume 4427 of Lecture Notes in Computer Science, page 241-244. Springer, (2007)