Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks., , , and . IEEE Trans. Ind. Informatics, 19 (1): 921-929 (2023)Latent Dirichlet Allocation for the Detection of Multi-Stage Attacks., , , and . ACIT, page 1-7. IEEE, (2023)A machine-learning-based system for real-time advanced persistent threat detection and prediction.. Manchester Metropolitan University, UK, (2017)British Library, EThOS.Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain., , , and . ICFNDS, page 27:1-27:5. ACM, (2019)Coverage Optimisation for Aerial Wireless Networks., and . IIT, page 233-238. IEEE, (2020)Machine Learning for Botnet Detection: An Optimized Feature Selection Approach., , , and . ICFNDS, page 195-200. ACM, (2021)Anomaly Detection Using Dynamic Time Warping., , , , , and . CSE/EUC, page 193-198. IEEE, (2019)Anomaly-Based Network Intrusion Detection Using SVM., , , , , and . WCSP, page 1-6. IEEE, (2019)Addressing Multi-Stage Attacks Using Expert Knowledge and Contextual Information., , , , , and . ICIN, page 188-194. IEEE, (2019)An IoT and business processes based approach for the monitoring and control of high value-added manufacturing processes., , , , and . ICFNDS, page 37:1-37:8. ACM, (2017)