Author of the publication

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics.

, , , , and . IJCNN, page 1-10. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What are you Googling? - Inferring search type information through a statistical classifier., , and . GLOBECOM, page 747-753. IEEE, (2013)Investigating the trade-off between overhead and delay for full packet traffic privacy., and . ICC Workshops, page 1345-1350. IEEE, (2013)A Neural Attention Model for Real-Time Network Intrusion Detection., , , and . LCN, page 291-299. IEEE, (2019)Padding and Fragmentation for Masking Packet Length Statistics., and . TMA, volume 7189 of Lecture Notes in Computer Science, page 85-88. Springer, (2012)Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques., , , and . Networking, volume 5550 of Lecture Notes in Computer Science, page 182-194. Springer, (2009)ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT., , , , , , , , , and 1 other author(s). GIOTS, volume 13533 of Lecture Notes in Computer Science, page 348-359. Springer, (2022)On packet loss modeling: An empirical assessment., , and . NOF, page 33-39. IEEE, (2017)A low complexity real-time Internet traffic flows neuro-fuzzy classifier., , , and . Comput. Networks, (2015)The Power of SDN to Improve the Estimation of the ISP Traffic Matrix Through the Flow Spread Concept., , , , and . IEEE J. Sel. Areas Commun., 34 (6): 1904-1913 (2016)Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics., , , , and . IJCNN, page 1-10. IEEE, (2019)