Author of the publication

A survey on deep learning for cybersecurity: Progress, challenges, and opportunities.

, , and . Comput. Networks, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dimensional data model for early alerts of malicious activities in a CSIRT., , , , and . SPECTS, page 1-8. IEEE, (2017)An Integral Model to Provide Reactive and Proactive Services in an Academic CSIRT Based on Business Intelligence., , , , , and . Syst., 5 (4): 52 (2017)On the Development of Strategic Games based on a Semiotic Analysis: A Case Study of an Optimized Tic-Tac-Toe., , , , , , and . ICEIS (1), page 425-432. SciTePress, (2016)Serious 3D Game over a Cluster Computing for Situated Learning of Traffic Signals., , , , , , and . DS-RT, page 1-10. IEEE, (2019)Early Alert Infrastructure for Earthquakes Through Mobile Technologies, Web, and Cloud Computing., , , , , and . CITI, volume 883 of Communications in Computer and Information Science, page 240-251. Springer, (2018)Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems., , and . Expert Syst. Appl., 238 (Part E): 122223 (March 2024)Scenario-based virtual network infrastructure management in research and educational testbeds with VNUML., , , , and . Ann. des Télécommunications, 64 (5-6): 305-323 (2009)BotHook: An option against Cyberpedophilia., , , and . CSNet, page 1-3. IEEE, (2017)Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach., , , , , , and . IEEE Access, (2019)A survey on deep learning for cybersecurity: Progress, challenges, and opportunities., , and . Comput. Networks, (2022)