Author of the publication

Network anomaly detection methods in IoT environments via deep learning: A Fair comparison of performance and robustness.

, , , , , and . Comput. Secur., (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TaRad: A Thing-Centric Sensing System for Detecting Activities of Daily Living., , , , and . IDCS, volume 11874 of Lecture Notes in Computer Science, page 357-368. Springer, (2019)Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark, , , and . 29th International Teletraffic Congress (ITC 29), Genoa, Italy, (2017)Internet Censorship in Italy: A First Look at 3G/4G Networks., , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 737-742. (2016)Characterizing and Modeling Traffic of Communication and Collaboration Apps Bloomed With COVID-19 Outbreak., , , , , and . RTSI, page 400-405. IEEE, (2021)Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark, , , and . 29th International Teletraffic Congress (ITC 29), Genoa, Italy, (2017)Know your Big Data Trade-offs when Classifying Encrypted Mobile Traffic with Deep Learning., , , , and . TMA, page 121-128. IEEE, (2019)Internet censorship in Italy: An analysis of 3G/4G networks., , and . ICC, page 1-6. IEEE, (2017)An experimental evaluation of the impact of heterogeneous scenarios and virtualization on the available bandwidth estimation tools., , , and . M&N, page 1-6. IEEE, (2017)Analyzing internet censorship in Pakistan., , , , , and . RTSI, page 1-6. IEEE, (2016)UANM: a platform for experimenting with available bandwidth estimation tools., , , and . ISCC, page 174-179. IEEE Computer Society, (2010)