Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Cyber Ontology for Insider Threats in the Financial Sector., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 6 (4): 64-85 (2015)Insider Threat on Databases: Modeling and Mitigation Techniques.. University at Buffalo, New York, USA, (2018)base-search.net (ftunivbuffalo:oai:ubir.buffalo.edu:10477/78527).Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems., , , , , and . NOMS, page 1-6. IEEE, (2023)Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain., , and . MIST@CCS, page 81-84. ACM, (2017)A Survey on the Challenges of Implementing Physical Memory Pools., , and . J. Internet Serv. Inf. Secur., 9 (2): 57-71 (2019)Guest Editorial: Special Issue on Advances in Insider Threat Detection., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (2): 1-2 (2021)Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks., , and . HASP@MICRO, page 53-57. ACM, (2022)Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous Vehicles., , and . SP (Workshops), page 240-243. IEEE, (2020)A Preliminary Cyber Ontology for Insider Threats in the Financial Sector., and . MIST@CCS, page 75-78. ACM, (2015)Impact Analysis of Training Data Characteristics for Phishing Email Classification., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (2): 85-98 (2021)