Author of the publication

Network security and anomaly detection with Big-DAMA, a big data analytics framework.

, , , , and . CloudNet, page 16-22. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework., , , , and . ICIT, page 1179-1185. IEEE, (2019)Correlating cyber incident information to establish situational awareness in Critical Infrastructures., , , , , and . PST, page 78-81. IEEE, (2016)Establishing national cyber situational awareness through incident information clustering., , , and . CyberSA, page 1-8. IEEE, (2015)Combating advanced persistent threats: From network event correlation to incident detection., , , and . Comput. Secur., (2015)Network security and anomaly detection with Big-DAMA, a big data analytics framework., , , , and . CloudNet, page 16-22. IEEE, (2017)Protecting cyber physical production systems using anomaly detection to enable self-adaptation., , , , and . ICPS, page 173-180. IEEE, (2018)Beyond gut instincts: Understanding, rating and comparing self-learning IDSs., , , and . CyberSA, page 1. IEEE, (2015)Semi-synthetic data set generation for security software evaluation., , , and . PST, page 156-163. IEEE Computer Society, (2014)Acquiring Cyber Threat Intelligence through Security Information Correlation., , , , , and . CYBCONF, page 1-7. IEEE, (2017)AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser Models., , , and . ICISSP, page 386-397. SciTePress, (2018)