Author of the publication

On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection.

, , , , and . ACM Trans. Priv. Secur., 24 (2): 8:1-8:39 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HosTaGe: a Mobile Honeypot for Collaborative Defense, , , and . International Conference on Security of Information and Networks, (2014)A decentralized honeypot for IoT Protocols based on Android devices., , , , and . Int. J. Inf. Sec., 21 (6): 1211-1222 (2022)On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection., , , , and . ACM Trans. Priv. Secur., 24 (2): 8:1-8:39 (2021)Poster: Challenges of Accurately Measuring Churn in P2P Botnets., , , , and . ACM Conference on Computer and Communications Security, page 2661-2663. ACM, (2019)Autonomously detecting sensors in fully distributed botnets., , , and . Comput. Secur., (2019)An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records., , , and . CNS, page 164-172. IEEE, (2021)Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots., , and . ACSAC, page 742-755. ACM, (2022)A honeypot-driven cyber incident monitor: lessons learned and steps ahead, , , and . International Conference on Security of Information and Networks, (2015)Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems., and . Int. J. Netw. Manag., (2019)COVID-19 vaccination certificates in the Darkweb., , , and . CoRR, (2021)