Author of the publication

Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems.

, , , , and . ICC, page 1-7. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Detection of Changes in Computer Network Measurements using Wavelets., and . ICCCN, page 1223-1227. IEEE, (2007)On the Design of Forgiving Biometric Security Systems., , and . iNetSeC, volume 309 of IFIP Advances in Information and Communication Technology, page 1-8. Springer, (2009)A hybrid simulator for an ATM network., and . Int. J. Commun. Syst., 13 (2): 179-184 (2000)Attribution of attack trees., , , and . Comput. Electr. Eng., 37 (4): 624-628 (2011)Approximate wireless sensor network health monitoring., and . IWCMC, page 376-381. ACM, (2007)Automatic Dataset Labelling and Feature Selection for Intrusion Detection Systems., , and . MILCOM, page 46-51. IEEE, (2014)Detecting security threats in the network core using Data Mining techniques., , and . NOMS, IEEE, (2006)Using Pattern-of-Life as Contextual Information for Anomaly-Based Intrusion Detection Systems., , , , and . IEEE Access, (2017)Node connectivity index as mobility metric for GA based QoS routing in MANET., and . Mobility Conference, page 104-111. ACM, (2007)Detecting and classifying delay Data Exceptions on communication networks using rule based algorithms., , and . Int. J. Commun. Syst., 18 (2): 159-177 (2005)