Author of the publication

Autoencoder-based Malware Analysis: An Imagery Analysis Approach to Enhance the Security of Smart City IoT.

, and . ISCAI, page 56-59. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community., , and . SEC, volume 175 of IFIP Conference Proceedings, page 291-300. Kluwer, (2000)Attack Modelling and Security Evaluation for Security Information and Event Management., , and . SECRYPT, page 391-394. SciTePress, (2012)Security and Anonymity in Agent Systems., and . Software Agents, Agent Systems and Their Applications, volume 32 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2012)Software Agents for Computer Network Security., and . Software Agents, Agent Systems and Their Applications, volume 32 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2012)Methodological Primitives for Phased Construction of Data Visualization Models., , and . J. Internet Serv. Inf. Secur., 5 (4): 60-84 (2015)Hybridization of computational intelligence methods for attack detection in computer networks., and . J. Comput. Sci., (2017)Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 5 (3): 14-29 (2014)Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems., , , and . Future Internet, 5 (3): 355-375 (2013)Agent-based simulation of cooperative defence against botnets., , and . Concurr. Comput. Pract. Exp., 24 (6): 573-588 (2012)Systematic Literature Review of Security Event Correlation Methods., , and . IEEE Access, (2022)