Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sniffing Detection Based on Network Traffic Probing and Machine Learning., , , , and . IEEE Access, (2020)Theory and implementation of a virtualisation level Future Internet defence in depth architecture., , , , , and . Int. J. Trust. Manag. Comput. Commun., 1 (3/4): 274-299 (2013)Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System., , , , and . Secur. Commun. Networks, (2019)Cybersecurity education: Evolution of the discipline and analysis of master programs., , , and . Comput. Secur., (2018)Distributed packet inspection for network security purposes in software-defined networking environments., , , , , and . ARES, page 106:1-106:7. ACM, (2020)Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall., and . IEEE Netw., 30 (6): 14-20 (2016)Deep Learning for Combating Misinformation in Multicategorical Text Contents., , , , , and . Sensors, 23 (24): 9666 (December 2023)Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study., , , , , , , and . Sensors, 23 (15): 6778 (August 2023)SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System., , , , and . ARES, page 49. ACM, (2018)Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments., , , and . Comput. Networks, (2024)