Author of the publication

A System for Detecting Anomalies and Identifying Smart Home Devices Using Collective Communication.

, , , , and . IntelITSIS, volume 2853 of CEUR Workshop Proceedings, page 386-397. CEUR-WS.org, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication., , , , and . IntelITSIS, volume 2623 of CEUR Workshop Proceedings, page 239-251. CEUR-WS.org, (2020)A graph-based vulnerability detection method., , , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 343-355. CEUR-WS.org, (2024)SVM-based Technique for Mobile Malware Detection., , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 85-97. CEUR-WS.org, (2019)The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis., , , and . ICTERI Workshops, volume 2104 of CEUR Workshop Proceedings, page 680-687. CEUR-WS.org, (2018)Approach for the unknown metamorphic virus detection., , , and . IDAACS, page 71-76. IEEE, (2017)Behavioral Model of a Smart Grid Cyberphysical System Functioning under the Influence of MitM Cyberattacks., , and . IntelITSIS, volume 3373 of CEUR Workshop Proceedings, page 628-637. CEUR-WS.org, (2023)Application of Multifactor Analysis for the Purpose of Detecting Malicious Software Implants of the Software in Local Computer Networks., , , , and . IntelITSIS, volume 2853 of CEUR Workshop Proceedings, page 417-426. CEUR-WS.org, (2021)A Technique for Detection of Bots Which Are Using Polymorphic Code., , , , and . CN, volume 431 of Communications in Computer and Information Science, page 265-276. Springer, (2014)Method of detecting cyberattacks on communication channels based on spectral clustering and machine learning methods., , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 375-387. CEUR-WS.org, (2024)Detecting Software Malicious Implant Based on Anomalies Research on Local Area Networks., , , , and . IntelITSIS, volume 2623 of CEUR Workshop Proceedings, page 194-207. CEUR-WS.org, (2020)