Author of the publication

A graph analytic metric for mitigating advanced persistent threat.

, and . ISI, page 129-133. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Order Metrics for Semantic Knowledge Systems., and . HAIS (2), volume 6077 of Lecture Notes in Computer Science, page 399-409. Springer, (2010)Towards a network-of-networks framework for cyber security., , , , , , and . ISI, page 106-108. IEEE, (2013)A New Algorithm for Proving Global Asymptotic Stability of Rational Difference Equations, and . CoRR, (2011)Towards A Topological Framework for Integrating Semantic Information Sources., , and . STIDS, volume 1304 of CEUR Workshop Proceedings, page 93-96. CEUR-WS.org, (2014)A graph analytic metric for mitigating advanced persistent threat., and . ISI, page 129-133. IEEE, (2013)Graph analytics for signature discovery., , , and . ISI, page 315-320. IEEE, (2013)Towards effective clustering techniques for the analysis of electric power grids., , , , , , and . HiPCNA-PG@SC, page 1:1-1:8. ACM, (2013)Order Theoretical Semantic Recommendation., , , , , and . OrdRing@ISWC, volume 1059 of CEUR Workshop Proceedings, page 9-20. CEUR-WS.org, (2013)Graph coarsening for path finding in cybersecurity graphs., , and . CSIIRW, page 7. ACM, (2013)View Discovery in OLAP Databases through Statistical Combinatorial Optimization., , , , and . SSDBM, volume 5566 of Lecture Notes in Computer Science, page 37-55. Springer, (2009)