Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intersection Approach to Vulnerability Handling., , , and . WEBIST (1), page 171-174. INSTICC Press, (2010)Who Will Score? A Machine Learning Approach to Supporting Football Team Building and Transfers., , and . Entropy, 23 (1): 90 (2021)How to Effectively Collect and Process Network Data for Intrusion Detection?, , , , and . Entropy, 23 (11): 1532 (2021)A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment., , and . Pattern Anal. Appl., 24 (4): 1441-1449 (2021)Unsupervised network traffic anomaly detection with deep autoencoders., , , and . Log. J. IGPL, 30 (6): 912-925 (2022)Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach., , and . EICC, page 53-56. ACM, (2022)Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach., , and . IP&C, volume 313 of Advances in Intelligent Systems and Computing, page 285-292. Springer, (2014)Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation., , , and . ISD, Risoprint / Association for Information Systems, (2022)Missing and Incomplete Data Handling in Cybersecurity Applications., , , and . ACIIDS, volume 12672 of Lecture Notes in Computer Science, page 413-426. Springer, (2021)Multimodal Hand-Palm Biometrics., and . ICANNGA (2), volume 4432 of Lecture Notes in Computer Science, page 407-414. Springer, (2007)