Author of the publication

Extended Framework for Target Oriented Network Intelligence Collection.

, , , and . SOCS, page 131-138. AAAI Press, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media., , and . CoRR, (2017)Analysis of Attack Graph Representations for Ranking Vulnerability Fixes., , , , and . GCAI, volume 55 of EPiC Series in Computing, page 215-228. EasyChair, (2018)Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback., , and . CoRR, (2020)Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic., , , and . SBP-BRiMS, volume 9708 of Lecture Notes in Computer Science, page 239-249. Springer, (2016)Deployment of DNIDS in Social Networks., , and . ISI, page 59-65. IEEE, (2007)Simulating Threats Propagation within the NSP Infrastructure., , , and . ISI, page 380. IEEE, (2007)Predictive web automation assistant for people with vision impairments., , , and . WWW, page 1031-1040. International World Wide Web Conferences Steering Committee / ACM, (2013)The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case., , , and . EuroS&P Workshops, page 99-103. IEEE, (2017)Application Marketplace Malware Detection by User Feedback Analysis., , , , and . ICISSP (Revised Selected Papers), volume 867 of Communications in Computer and Information Science, page 1-19. Springer, (2017)Extended Framework for Target Oriented Network Intelligence Collection., , , and . SOCS, page 131-138. AAAI Press, (2014)