Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survey of intrusion detection systems: techniques, datasets and challenges, , , and . Cybersecurity, 2 (1): 20 (Jul 17, 2019)Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware., , , and . SecNet, volume 381 of Communications in Computer and Information Science, page 177-184. Springer, (2013)An Anomaly Intrusion Detection System Using C5 Decision Tree Classifier., , and . PAKDD (Workshops), volume 11154 of Lecture Notes in Computer Science, page 149-155. Springer, (2018)Crime Toolkits: The Productisation of Cybercrime., , , , and . TrustCom/ISPA/IUCC, page 1626-1632. IEEE Computer Society, (2013)