Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lateral Movement Detection Using User Behavioral Analysis., , , , , , , , , and 2 other author(s). CoRR, (2022)Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks., , , , , , , , and . CoRR, (2023)Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach., , , , , , , , and . CoRR, (2023)Anomaly Detection via Federated Learning., , , , , , , , , and 4 other author(s). CoRR, (2022)FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks., , , , , and . CoRR, (2023)Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain., , , , , , , , , and 1 other author(s). ICMLA, page 1350-1357. IEEE, (2022)Enhancing Exfiltration Path Analysis Using Reinforcement Learning., , , , , , , , , and . CAMLIS, volume 3652 of CEUR Workshop Proceedings, page 77-90. CEUR-WS.org, (2023)Discovering Command and Control Channels Using Reinforcement Learning., , , , , , , , , and . CoRR, (2024)Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning., , , , , , , and . CoRR, (2024)Zero Day Threat Detection Using Metric Learning Autoencoders., , , , , , , , , and . ICMLA, page 1318-1325. IEEE, (2022)