Picture for Bogdan Ghita

Bogdan Ghita

Personalised Feedback Framework for Online Education Programmes Using Generative AI

Add code
Oct 14, 2024
Viaarxiv icon

Audio Interval Retrieval using Convolutional Neural Networks

Add code
Sep 21, 2021
Figure 1 for Audio Interval Retrieval using Convolutional Neural Networks
Figure 2 for Audio Interval Retrieval using Convolutional Neural Networks
Figure 3 for Audio Interval Retrieval using Convolutional Neural Networks
Figure 4 for Audio Interval Retrieval using Convolutional Neural Networks
Viaarxiv icon

A Novel Online Incremental Learning Intrusion Prevention System

Add code
Sep 20, 2021
Figure 1 for A Novel Online Incremental Learning Intrusion Prevention System
Figure 2 for A Novel Online Incremental Learning Intrusion Prevention System
Figure 3 for A Novel Online Incremental Learning Intrusion Prevention System
Figure 4 for A Novel Online Incremental Learning Intrusion Prevention System
Viaarxiv icon

Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation

Add code
Sep 08, 2021
Figure 1 for Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation
Figure 2 for Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation
Figure 3 for Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation
Figure 4 for Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation
Viaarxiv icon

Detection of Insider Threats using Artificial Intelligence and Visualisation

Add code
Sep 06, 2021
Figure 1 for Detection of Insider Threats using Artificial Intelligence and Visualisation
Figure 2 for Detection of Insider Threats using Artificial Intelligence and Visualisation
Figure 3 for Detection of Insider Threats using Artificial Intelligence and Visualisation
Figure 4 for Detection of Insider Threats using Artificial Intelligence and Visualisation
Viaarxiv icon

Detection of LDDoS Attacks Based on TCP Connection Parameters

Add code
Mar 12, 2019
Figure 1 for Detection of LDDoS Attacks Based on TCP Connection Parameters
Figure 2 for Detection of LDDoS Attacks Based on TCP Connection Parameters
Figure 3 for Detection of LDDoS Attacks Based on TCP Connection Parameters
Figure 4 for Detection of LDDoS Attacks Based on TCP Connection Parameters
Viaarxiv icon