Author of the publication

Web Application Attacks Detection Using Deep Learning.

, , , and . CIARP, volume 12702 of Lecture Notes in Computer Science, page 227-236. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capturing the security expert knowledge in feature selection for web application attack detection., , , and . CoRR, (2024)Proximity tracing applications for COVID-19: data privacy and security., , , , , , , and . CLEI, page 1-10. IEEE, (2021)Improving Web Application Firewalls through Anomaly Detection., , , and . ICMLA, page 779-784. IEEE, (2018)Web Application Attacks Detection Using Deep Learning., , , and . CIARP, volume 12702 of Lecture Notes in Computer Science, page 227-236. Springer, (2021)Expectation-Maximization Algorithm for Determining Natural Selection of Y-Linked Genes Through Two-Sex Branching Processes., , and . J. Comput. Biol., 19 (9): 1015-1026 (2012)Non-parametric Bayesian estimation for multitype branching processes through simulation-based methods., , , and . Comput. Stat. Data Anal., 52 (3): 1281-1291 (2008)Web Application Attacks Detection Using Machine Learning Techniques., , and . ICMLA, page 1065-1072. IEEE, (2018)Towards Model-Driven Virtual Patching for Web Applications., , , , and . LADC, page 109-118. IEEE Computer Society, (2016)Polypus: a Big Data Self-Deployable Architecture for Microblogging Text Extraction and Real-Time Sentiment Analysis., , and . CoRR, (2018)Combining Semantic Web technologies with Multi-Agent Systems for integrated access to biological resources, , , , and . Journal of Biomedical Informatics (JBI), 41 (5): 848-859 (2008)