Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power Grid Outlier Treatment through Kalman Filter., , , , , and . ISSRE Workshops, page 407-412. IEEE Computer Society, (2014)Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection., and . J. Inf. Secur. Appl., (2018)Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection., and . CoRR, (2017)A novel security information and event management system for enhancing cyber security in a hydroelectric dam., , , and . Int. J. Crit. Infrastructure Prot., (2016)A framework for Internet data real-time processing: A machine-learning approach., and . ICCST, page 1-6. IEEE, (2014)Addressing Security Issues of Electronic Health Record Systems through Enhanced SIEM Technology., , , and . ARES, page 646-653. IEEE Computer Society, (2013)An Hybrid Architecture to Enhance Attacks Detection on IT infrastructure., , , and . IDC, volume 570 of Studies in Computational Intelligence, page 437-442. Springer, (2014)Energy-Based Detection of Multi-layer Flooding Attacks on Wireless Sensor Network., and . SAFECOMP Workshops, volume 8696 of Lecture Notes in Computer Science, page 339-349. Springer, (2014)Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees., , and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 1-15. Springer, (2013)A GPS Spoofing Resilient WAMS for Smart Grid., , , and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 134-147. Springer, (2013)