Author of the publication

Dimensionality Reduction and Visualization of Network Intrusion Detection Data.

, , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 441-455. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns., , , , and . J. Imaging, 8 (12): 324 (December 2022)Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes., , , , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 320-335. Springer, (2019)Targeted Universal Adversarial Perturbations for Automatic Speech Recognition., , , , and . ISC, volume 13118 of Lecture Notes in Computer Science, page 358-373. Springer, (2021)Breaking a 3D-Based CAPTCHA Scheme., , and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 391-405. Springer, (2011)SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments., , , , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 106-126. Springer, (2021)STE3D-CAP: Stereoscopic 3D CAPTCHA., , and . CANS, volume 6467 of Lecture Notes in Computer Science, page 221-240. Springer, (2010)Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games., , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 291-304. Springer, (2012)A 3D Approach for the Visualization of Network Intrusion Detection Data., , and . CW, page 308-315. IEEE, (2018)A Visual One-Time Password Authentication Scheme Using Mobile Devices., , , and . ICICS, volume 8958 of Lecture Notes in Computer Science, page 243-257. Springer, (2014)Privacy-preserving file sharing on cloud storage with certificateless signcryption., , and . Theor. Comput. Sci., (2022)