Author of the publication

Web Application Attacks Detection Using Deep Learning.

, , , and . CIARP, volume 12702 of Lecture Notes in Computer Science, page 227-236. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web Application Attacks Detection Using Machine Learning Techniques., , and . ICMLA, page 1065-1072. IEEE, (2018)A Multi-Scale A Contrario method for Unsupervised Image Anomaly Detection., , and . ICMLA, page 179-184. IEEE, (2021)Diffusion models meet image counter-forensics., , , and . WACV, page 3913-3923. IEEE, (2024)Diffusion models meet image counter-forensics., , , and . CoRR, (2023)Improving Web Application Firewalls through Anomaly Detection., , , and . ICMLA, page 779-784. IEEE, (2018)Non Local Image Denoising Using Image Adapted Neighborhoods.. CIARP, volume 6419 of Lecture Notes in Computer Science, page 277-284. Springer, (2010)Processing of Microarray Images., and . CIARP, volume 5856 of Lecture Notes in Computer Science, page 962-969. Springer, (2009)Web Application Attacks Detection Using Deep Learning., , , and . CIARP, volume 12702 of Lecture Notes in Computer Science, page 227-236. Springer, (2021)LoRA Smart Sensors for IoT Fire and Ground Motion Safety., , , , , , , , , and 2 other author(s). exp.at, page 271-274. IEEE, (2023)Communication Skills Personal Trainer Based on Viola-Jones Object Detection Algorithm., , , and . IDEAL (1), volume 11314 of Lecture Notes in Computer Science, page 722-729. Springer, (2018)