Background and activities
Scientific, academic and artistic work
A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database
- (2018) BPRH: Bayesian personalized ranking for heterogeneous implicit feedback. Information Sciences. vol. 453.
- (2017) A big data analytics approach to combat telecommunication vulnerabilities. Cluster Computing. vol. 20 (3).
- (2016) Better Protection of SS7 Networks With Machine Learning. 2016 6th International Conference on IT Convergence and Security (ICITCS).
- (2016) A network based IMSI Catcher detection. 2016 6th International Conference on IT Convergence and Security (ICITCS).
- (2015) Detecting IMSI-catcher using soft computing. Communications in Computer and Information Science. vol. 545.
- (2013) Enhancing the effectiveness of Web Application Firewalls by generic feature selection. Logic journal of the IGPL (Print). vol. 21 (4).
- (2012) Comprehensive analysis of spectral minutiae for vein pattern recognition. IET Biometrics. vol. 1 (1).
- (2012) Optimal and robust communication for a uniform source. IET Communications. vol. 6 (6).
- (2012) Combining expert knowledge with automatic feature extraction for reliable web attack detection. Security and Communication Networks.
- (2012) Generic feature selection measure for botnet malware detection. Proceedings of the 12th International Conference on Intelligent Systems Design and Applications (ISDA); 27 - 29 November 2012; Kochi, India.
- (2012) A General Lp-norm Support Vector Machine via Mixed 0-1 Programming. Machine Learning and Data Mining in Pattern Recognition, 8th International Conference; MLDM 2012, Berlin, Germany, July 13-20, 2012. Proceedings.
- (2012) Adaptive Intrusion Detection System via Online Machine Learning. Proceedings of the 12th International Conference on Hybrid Intelligent Systems (HIS); 4-7 December 2012; Pune, India.
- (2012) Feature Extraction Methods for Intrusion Detection Systems. Threats, Countermeasures, and Advances in Applied Information Security.
- (2012) Reliability in A Feature-Selection Process for Intrusion Detection. Reliable Knowledge Discovery.
- (2011) Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. International Journal on Mobile Computing and Multimedia Communications. vol. 3 (1).
- (2011) On General Definition of L1-norm Support Vector Machines for Feature Selection. International Journal of Machine Learning and Computing. vol. 1 (3).
- (2011) A General L1-norm Support Vector Machine for Feature Selection. Proceedings of 2011 3rd International Conference on Machine Learning and Computing.
- (2011) A New Ensemble-Feature-Selection Framework for Intrusion Detection. ISDA 2011, Proceedings of the 11th International Conference on Intelligent Systems Design and Applications; 22 – 24 November 2011, Córdoba, Spain.
- (2011) Application of the Generic Feature Selection Measure in Detection of Web Attacks. Computational Intelligence in Security for Information Systems4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings.
- (2011) Applying feature selection to payload-based web application firewalls. Proceedings of the 3rd International Workshop On Securityand Communication Networks (IWSCN 2011), 18-20 May, 2011, Gjøvik, Norway.