Author of the publication

Evaluation of Various Techniques for SQL Injection Attack Detection.

, and . CORES, volume 226 of Advances in Intelligent Systems and Computing, page 753-762. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of the Pre-processing Methods in Image-Based Palmprint Biometrics., , and . IP&C, volume 681 of Advances in Intelligent Systems and Computing, page 43-48. Springer, (2017)Netflow-Based Malware Detection and Data Visualisation System., , and . CISIM, volume 10244 of Lecture Notes in Computer Science, page 652-660. Springer, (2017)Symmetry-Based Salient Points Detection in Face Images., and . ICAISC, volume 4029 of Lecture Notes in Computer Science, page 758-767. Springer, (2006)Ontology Applied in Decision Support System for Critical Infrastructures Protection., , , and . IEA/AIE (1), volume 6096 of Lecture Notes in Computer Science, page 671-680. Springer, (2010)Network Events Correlation for Federated Networks Protection System., , , , and . ServiceWave, volume 6994 of Lecture Notes in Computer Science, page 100-111. Springer, (2011)A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment., , and . Pattern Anal. Appl., 24 (4): 1441-1449 (2021)Who Will Score? A Machine Learning Approach to Supporting Football Team Building and Transfers., , and . Entropy, 23 (1): 90 (2021)How to Effectively Collect and Process Network Data for Intrusion Detection?, , , , and . Entropy, 23 (11): 1532 (2021)Unsupervised network traffic anomaly detection with deep autoencoders., , , and . Log. J. IGPL, 30 (6): 912-925 (2022)Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach., , and . EICC, page 53-56. ACM, (2022)