Author of the publication

Exploiting N-Gram Location for Intrusion Detection.

, , and . ICTAI, page 1093-1098. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Content Spatial Distribution to Improve Detection of Intrusions., , and . ACM Trans. Internet Techn., 18 (2): 25:1-25:21 (2018)Model checking time-dependent system specifications using Time Stream Petri Nets and Uppaal., , and . Appl. Math. Comput., 218 (16): 8160-8186 (2012)A Cloud-based platform for the emulation of complex cybersecurity scenarios., , , , and . Future Gener. Comput. Syst., (2018)Modelling and simulation of complex manufacturing systems using statechart-based actors., , and . Simul. Model. Pract. Theory, 19 (2): 685-703 (2011)PCkAD: an unsupervised intrusion detection technique exploiting within payload n-gram location distribution., , and . CoRR, (2014)Adaptive Ladder Queue: Achieving O(1) Amortized Access Time in Practice., and . SIGSIM-PADS, page 101-104. ACM, (2018)Performance of a multi-agent system over a multi-core cluster managed by Terracotta., , , and . SpringSim (TMS-DEVS), page 125-133. SCS/ACM, (2011)A development methodology for embedded systems based on RT-DEVS., and . Innov. Syst. Softw. Eng., 5 (2): 117-127 (2009)Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks., , , and . IDCS, volume 8729 of Lecture Notes in Computer Science, page 263-274. Springer, (2014)Using CalcuList To MapReduce Json Documents., and . SEBD, volume 2400 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)