Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System., , , , and . ARES, page 49. ACM, (2018)Efficient distributed network covert channels for Internet of things environments†., , , , and . J. Cybersecur., (2020)Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets., , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (1): 20-43 (2021)Distributed packet inspection for network security purposes in software-defined networking environments., , , , , and . ARES, page 106:1-106:7. ACM, (2020)Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study., , , and . ARES, page 69:1-69:10. ACM, (2020)Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels., , , and . ARES, page 73:1-73:8. ACM, (2021)The impact of malware evolution on the analysis methods and infrastructure., , , , and . FedCSIS, volume 11 of Annals of Computer Science and Information Systems, page 549-553. (2017)Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach., , , and . ARES, page 12:1-12:10. ACM, (2018)Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability., , , and . ARES, page 65:1-65:8. ACM, (2019)Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches., , , , and . ARES, page 108:1-108:8. ACM, (2019)