Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time., , , , , , and . MCS, volume 9132 of Lecture Notes in Computer Science, page 168-180. Springer, (2015)Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis., , and . IEEE Trans. Dependable Secur. Comput., 9 (5): 714-726 (2012)HMM-Web: A Framework for the Detection of Attacks Against Web Applications., , and . ICC, page 1-6. IEEE, (2009)Detection of Server-side Web Attacks., and . WAPA, volume 11 of JMLR Proceedings, page 160-166. JMLR.org, (2010)Stealth attacks: An extended insight into the obfuscation effects on Android malware., , , , and . Comput. Secur., (2015)Pharmaguard WebApp: An Application for the Detection of Illegal Online Pharmacies., , , , and . KDWeb, volume 1748 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces., , , and . ACSAC, page 311-320. IEEE Computer Society, (2009)Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues., , and . Inf. Sci., (2013)PharmaGuard: Automatic identification of illegal search-indexed online pharmacies., , , , , , and . CYBCONF, page 324-329. IEEE, (2015)An Evasion Resilient Approach to the Detection of Malicious PDF Files., , , and . ICISSP (Revised Selected Papers), volume 576 of Communications in Computer and Information Science, page 68-85. Springer, (2015)