Author of the publication

Biblio-US17: A labeled real URL dataset for anomaly-based intrusion detection systems development.

, , , , and . EICC, page 217-218. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of a Dialogue System Based on a Generic Model that Combines Robust Speech Understanding and Mixed-initiative Control., , , and . LREC, European Language Resources Association, (2000)Tackling the Big Data 4 vs for anomaly detection., , , and . INFOCOM Workshops, page 500-505. IEEE, (2014)Musical Style Recognition by Detection of Compass., , and . IbPRIA, volume 2652 of Lecture Notes in Computer Science, page 876-883. Springer, (2003)A voice activated dialogue system for fast-food restaurant applications., , , and . EUROSPEECH, page 1783-1786. ISCA, (1997)Features Extraction for Music Notes Recognition using Hidden Markov Models., , and . SIGMAP, page 184-191. INSTICC Press, (2007)Evaluation of a low-rate DoS attack against application servers., , and . Comput. Secur., 27 (7-8): 335-354 (2008)HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments., , , , , and . EICC, page 65-70. ACM, (2023)Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation., , , , , and . EICC, page 1-6. ACM, (2023)Anomaly Detection in P2P Networks Using Markov Modelling., , , and . AP2PS, page 156-159. IEEE Computer Society, (2009)Environmental Security in P2P Networks., , and . AP2PS, page 138-143. IEEE Computer Society, (2009)