Cited By
View all- Komadina AKovačević IŠtengl BGroš S(2024)Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack DetectionSensors10.3390/s2408263624:8(2636)Online publication date: 20-Apr-2024
- Komadina AMartinić MGroš SMihajlović Ž(2024)Comparing Threshold Selection Methods for Network Anomaly DetectionIEEE Access10.1109/ACCESS.2024.345216812(124943-124973)Online publication date: 2024
- Kim HKo JBu FShin K(2023)Characterization of Simplicial Complexes by Counting Simplets Beyond Four NodesProceedings of the ACM Web Conference 202310.1145/3543507.3583332(317-327)Online publication date: 30-Apr-2023
- Show More Cited By