Author of the publication

Explainable artificial intelligence for cybersecurity: a literature survey.

, , , , , , , , and . Ann. des Télécommunications, 77 (11-12): 789-812 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generative Deep Learning for Internet of Things Network Traffic Generation., , , , and . PRDC, page 70-79. IEEE, (2020)SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges., , , and . ARES, page 42:1-42:13. ACM, (2024)Explainable artificial intelligence for cybersecurity: a literature survey., , , , , , , , and . Ann. des Télécommunications, 77 (11-12): 789-812 (2022)Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework., , , , and . FPS, volume 13877 of Lecture Notes in Computer Science, page 142-157. Springer, (2022)Solving security constraints for 5G slice embedding: A proof-of-concept., , , , , and . Comput. Secur., (2020)Siamese Network Based Feature Learning for Improved Intrusion Detection., , , and . ICONIP (1), volume 11953 of Lecture Notes in Computer Science, page 377-389. Springer, (2019)Designing Security-Aware Service Requests for NFV-Enabled Networks., and . ICCCN, page 1-9. IEEE, (2019)XAI-driven Adversarial Attacks on Network Intrusion Detectors., , , , , , , and . EICC, page 65-73. ACM, (2024)