Author of the publication

Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection.

, , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 451-463. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extreme Learning Machines for Web Layer Anomaly Detection., , , and . IP&C, volume 525 of Advances in Intelligent Systems and Computing, page 226-233. Springer, (2016)The Gap between Packet Level QoS and Objective QoE Assessment of WWW on Mobile Devices., , , and . IP&C, volume 84 of Advances in Intelligent and Soft Computing, page 461-468. Springer, (2010)Evaluation of Measurement Based Admission Control Algorithms for IEEE 802.16 Networks in Simulations with L2S Physical Layer Abstraction and nbLDPC Codes., , and . IP&C, volume 84 of Advances in Intelligent and Soft Computing, page 447-459. Springer, (2010)A Novel Signal-Based Approach to Anomaly Detection in IDS Systems., , , and . ICANNGA, volume 5495 of Lecture Notes in Computer Science, page 527-536. Springer, (2009)Software Development Metrics Prediction Using Time Series Methods., , , , and . CISIM, volume 11703 of Lecture Notes in Computer Science, page 311-323. Springer, (2019)A Proposal of Algorithm for Web Applications Cyber Attack Detection., , , and . CISIM, volume 8838 of Lecture Notes in Computer Science, page 680-687. Springer, (2014)Cyber Security of the Application Layer of Mission Critical Industrial Systems., , , and . CISIM, volume 9842 of Lecture Notes in Computer Science, page 342-351. Springer, (2016)Correlation Approach for SQL Injection Attacks Detection., , , and . CISIS/ICEUTE/SOCO Special Sessions, volume 189 of Advances in Intelligent Systems and Computing, page 177-185. Springer, (2012)Recognizing Anomalies/Intrusions in Heterogeneous Networks., , , , and . Computer Recognition Systems 3, volume 57 of Advances in Intelligent and Soft Computing, Springer, (2009)Intersection Approach to Vulnerability Handling., , , and . WEBIST (1), page 171-174. INSTICC Press, (2010)