Author of the publication

Exploiting N-Gram Location for Intrusion Detection.

, , and . ICTAI, page 1093-1098. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Content Spatial Distribution to Improve Detection of Intrusions., , and . ACM Trans. Internet Techn., 18 (2): 25:1-25:21 (2018)A Cloud-based platform for the emulation of complex cybersecurity scenarios., , , , and . Future Gener. Comput. Syst., (2018)PCkAD: an unsupervised intrusion detection technique exploiting within payload n-gram location distribution., , and . CoRR, (2014)An Infrastructure for Service Accountability based on Digital Identity and Blockchain 3.0., , , , and . INFOCOM Workshops, page 632-637. IEEE, (2019)A multi-protocol framework for the development of collaborative virtual environments., and . CoRR, (2014)A multi-protocol framework for the development of collaborative virtual environments., and . CSCWD, page 449-454. IEEE, (2015)Using virtual environments for the assessment of cybersecurity issues in IoT scenarios., , , and . Simul. Model. Pract. Theory, (2017)Towards Adaptive Access Control., , , , and . DBSec, volume 10980 of Lecture Notes in Computer Science, page 99-109. Springer, (2018)A Simulation-based and Data-driven Framework for Enabling the Analysis and Design of Business Processes based on Blockchain and Smart Contracts Solutions., , , , , and . DLT@ITASEC, volume 2580 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)Exploiting N-Gram Location for Intrusion Detection., , and . ICTAI, page 1093-1098. IEEE Computer Society, (2015)