Author of the publication

Real-time stream processing tool for detecting suspicious network patterns using machine learning.

, , , and . ARES, page 60:1-60:7. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Events Correlation for Federated Networks Protection System., , , , and . ServiceWave, volume 6994 of Lecture Notes in Computer Science, page 100-111. Springer, (2011)Ontology Applied in Decision Support System for Critical Infrastructures Protection., , , and . IEA/AIE (1), volume 6096 of Lecture Notes in Computer Science, page 671-680. Springer, (2010)Computer Vision Method for Detecting Adult-Oriented Content in Images., and . IP&C, volume 184 of Advances in Intelligent Systems and Computing, page 19-24. Springer, (2012)Intersection Approach to Vulnerability Handling., , , and . WEBIST (1), page 171-174. INSTICC Press, (2010)Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach., , and . EICC, page 53-56. ACM, (2022)Demonstrating interoperability between unmanned ground systems and command and control systems., , , , , , , , , and 2 other author(s). Int. J. Intell. Def. Support Syst., 6 (2): 100-129 (2021)Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach., , and . IP&C, volume 313 of Advances in Intelligent Systems and Computing, page 285-292. Springer, (2014)Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation., , , and . ISD, Risoprint / Association for Information Systems, (2022)Missing and Incomplete Data Handling in Cybersecurity Applications., , , and . ACIIDS, volume 12672 of Lecture Notes in Computer Science, page 413-426. Springer, (2021)Fake News and Threats to IoT - The Crucial Aspects of Cyberspace in the Times of Cyberwar., , , and . RIIFORUM, page 31-38. Springer, (2022)