Author of the publication

A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.

, , , , , , , and . IRI, page 1-10. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting an antivirus interface., , , , and . Comput. Stand. Interfaces, 31 (6): 1182-1189 (2009)FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation., and . ACM Conference on Computer and Communications Security, page 2149-2150. ACM, (2020)Binary Control-Flow Trimming., and . ACM Conference on Computer and Communications Security, page 1009-1022. ACM, (2019)Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors., , and . DMS, page 257-260. Knowledge Systems Institute, (2010)BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 505-517 (2021)Vigiles: Fine-Grained Access Control for MapReduce Systems., , , and . BigData Congress, page 40-47. IEEE Computer Society, (2014)CUDA au Coq: A Framework for Machine-validating GPU Assembly Programs., , and . DATE, page 474-479. IEEE, (2019)Automated Threat Report Classification over Multi-Source Data., , , , and . CIC, page 236-245. IEEE Computer Society, (2018)Data Mining for Security Applications., , , and . EUC (2), page 585-589. IEEE Computer Society, (2008)978-0-7695-3492-3.Secure Semantic Sensor Web and Pervasive Computing., and . SUTC/UMC, page 5-10. IEEE Computer Society, (2010)