Author of the publication

The Proposition of Balanced and Explainable Surrogate Method for Network Intrusion Detection in Streamed Real Difficult Data.

, , , , and . ICCCI (CCIS Volume), volume 1463 of Communications in Computer and Information Science, page 241-252. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of Various Techniques for SQL Injection Attack Detection., and . CORES, volume 226 of Advances in Intelligent Systems and Computing, page 753-762. Springer, (2013)Image Recognition Techniques Applied to Automated and Objective QoE Assessment of Mobile WWW Services., , , and . ICCVG (1), volume 6374 of Lecture Notes in Computer Science, page 275-282. Springer, (2010)Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection., , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 451-463. Springer, (2010)Ontology-Based Decision Support for Security Management in Heterogeneous Networks., , , , and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 920-927. Springer, (2009)The Concept of Applying Lifelong Learning Paradigm to Cybersecurity., , , and . ICIC (3), volume 10363 of Lecture Notes in Computer Science, page 663-671. Springer, (2017)Feature Extraction Method for Contactless Palmprint Biometrics., and . ICIC (3), volume 93 of Communications in Computer and Information Science, page 435-442. Springer, (2010)Distributing extreme learning machines with Apache Spark for NetFlow-based malware activity detection.. Pattern Recognit. Lett., (2018)Intelligent operator: Machine learning based decision support and explainer for human operators and service providers in the fog, cloud and edge networks., , , and . J. Inf. Secur. Appl., (2021)Multimedia analysis platform for crime prevention and investigation., , , , , , , , and . Multim. Tools Appl., 80 (15): 23681-23700 (2021)Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project., , , , , and . ARES, page 65:1-65:7. ACM, (2021)