Author of the publication

A Natural Language Processing Based Trend Analysis of Advanced Persistent Threat Techniques.

, , and . IEEE BigData, page 2995-3000. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception., , , , , and . ACM Trans. Priv. Secur., 26 (4): 51:1-51:36 (November 2023)Binary-centric defense of production operating systems against kernel queue injection attacks., and . J. Comput. Virol. Hacking Tech., 15 (4): 259-275 (2019)CHIMERA: Autonomous Planning and Orchestration for Malware Deception., , , , , and . CNS, page 173-181. IEEE, (2021)Static analysis based invariant detection for commodity operating systems., and . Comput. Secur., (2014)Toward protecting control flow confidentiality in cloud-based computation., and . Comput. Secur., (2015)Constructing E-Tourism platform based on service value broker: A knowledge management perspective., , , , and . IEEE BigData, page 17-24. IEEE Computer Society, (2013)Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks., , , , , and . ICDCS, page 1527-1538. IEEE, (2019)Mitigating Large Response Time Fluctuations through Fast Concurrency Adapting in Clouds., , , and . IPDPS, page 368-377. IEEE, (2020)Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings, , , and . Springer, (2019)Coordinating Fast Concurrency Adapting With Autoscaling for SLO-Oriented Web Applications., , , and . IEEE Trans. Parallel Distributed Syst., 33 (12): 3349-3362 (2022)