Author of the publication

Application of growing hierarchical SOM for visualisation of network forensics traffic data.

, , , , and . Neural Networks, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructive Recursive Deterministic Perceptron Neural Networks with Genetic Algorithms., , , and . IJPRAI, (2013)Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks., , , and . CyberSec, page 101-106. IEEE Computer Society, (2015)A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks., , , and . Security and Communication Networks, (2017)Hybrid feature selection technique for intrusion detection system., , and . IJHPCN, 13 (2): 232-240 (2019)Motivation and opportunity based model to reduce information security insider threats in organisations., , , and . J. Inf. Secur. Appl., (2018)Re-thinking threat intelligence., , , and . CyCon U.S., page 131-139. IEEE Computer Society, (2016)The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence., , , , , , and . CEC, page 1015-1021. IEEE, (2016)An Initial Investigation into Attribution in SCADA Systems., , and . ICS-CSR, BCS, (2013)An investigation into cooperative behaviour : altruism and evolutionary computing.. De Montfort University, Leicester, UK, (2003)British Library, EThOS.A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks., , , and . IEEE Access, (2017)