From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis., , и . IFIP Int. Conf. Digital Forensics, том 532 из IFIP Advances in Information and Communication Technology, стр. 263-289. Springer, (2018)Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments., , и . IFIP Int. Conf. Digital Forensics, том 589 из IFIP Advances in Information and Communication Technology, стр. 161-180. Springer, (2020)Can OODB Technology Solve CAD Design Data Management Problems? (Panel Abstract).. ICDE, стр. 458. IEEE Computer Society, (1993)Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction., , и . J. Digit. Forensics Secur. Law, 9 (2): 181-196 (2014)Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detection., , и . Cybersecur., 6 (1): 2 (2023)Poisoning Attacks Against Machine Learning: Can Machine Learning Be Trustworthy?, , и . Computer, 55 (11): 94-99 (2022)Enterprise-Level Cyber Situation Awareness., , , и . Theory and Models for Cyber Situation Awareness, том 10030 из Lecture Notes in Computer Science, Springer, (2017)Attacks on ML Systems: From Security Analysis to Attack Mitigation., , , , и . ICISS, том 13784 из Lecture Notes in Computer Science, стр. 119-138. Springer, (2022)SafeConfig'17: Applying the Scientific Method to Active Cyber Defense Research., , и . CCS, стр. 2641-2642. ACM, (2017)Deep Learning for Detecting Network Attacks: An End-to-End Approach., , , и . DBSec, том 12840 из Lecture Notes in Computer Science, стр. 221-234. Springer, (2021)