Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Web Application Firewalls through Anomaly Detection., , , and . ICMLA, page 779-784. IEEE, (2018)Parametric Bayesian inference for Y-linked two-sex branching models., , and . Stat. Comput., 23 (6): 727-741 (2013)Web Application Attacks Detection Using Deep Learning., , , and . CIARP, volume 12702 of Lecture Notes in Computer Science, page 227-236. Springer, (2021)Proximity tracing applications for COVID-19: data privacy and security., , , , , , , and . CLEI, page 1-10. IEEE, (2021)Machine learning-assisted virtual patching of web applications., , , and . CoRR, (2018)Web Application Attacks Detection Using Machine Learning Techniques., , and . ICMLA, page 1065-1072. IEEE, (2018)Contact tracing solutions for COVID-19: applications, data privacy and security., , , , , , and . CLEI Electron. J., (2022)Towards Model-Driven Virtual Patching for Web Applications., , , , and . LADC, page 109-118. IEEE Computer Society, (2016)Expectation-Maximization Algorithm for Determining Natural Selection of Y-Linked Genes Through Two-Sex Branching Processes., , and . J. Comput. Biol., 19 (9): 1015-1026 (2012)Bayesian Inference in Y-Linked Two-Sex Branching Processes with Mutations: ABC Approach., , and . IEEE ACM Trans. Comput. Biol. Bioinform., 18 (2): 525-538 (2021)