Author of the publication

Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination.

, , , , and . Neural Networks, 16 (5-6): 907-914 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Co-Citation count vs correlation for influence network visualization., , and . Inf. Vis., 2 (3): 160-170 (2003)A Review of Graph Approaches to Network Security Analytics.. From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 300-323. Springer, (2018)Document Clustering, Visualization, and Retrieval Link Mining., , and . Clustering and Information Retrieval, Kluwer, (2003)Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances., , and . ACSAC, page 350-359. IEEE Computer Society, (2004)Mission-focused cyber situational understanding via graph analytics., , , , , and . CyCon, page 427-448. IEEE, (2018)Managing attack graph complexity through visual hierarchical aggregation., and . VizSEC, page 109-118. ACM, (2004)Dependency-Based Link Prediction for Learning Microsegmentation Policy., and . ICICS, volume 13407 of Lecture Notes in Computer Science, page 569-588. Springer, (2022)Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination., , , , and . Neural Networks, 16 (5-6): 907-914 (2003)k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks., , , and . ESORICS, volume 6345 of Lecture Notes in Computer Science, page 573-587. Springer, (2010)Topological Vulnerability Analysis., and . Cyber Situational Awareness, volume 46 of Advances in Information Security, Springer, (2010)