Author of the publication

Insights into anomaly-based intrusion detection systems usability. A case study using real http requests.

, , , and . EICC, page 82-89. ACM, (2024)