Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using sequential pattern mining for common event format (CEF) cyber data., , , , , and . CISRC, page 2:1-2:4. ACM, (2017)A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters., , and . IEEE Trans. Netw. Serv. Manag., 7 (4): 218-230 (2010)Using link RTT to passively detect unapproved wireless nodes., , and . Int. J. Secur. Networks, 4 (3): 153-163 (2009)The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity., and . Int. J. Cyber Warf. Terror., 6 (3): 43-52 (2016)Bio-Inspired, Host-based Firewall., , , , , , and . CSE, page 86-91. IEEE, (2020)A Hasty Grid S&R Prototype Using Autonomous UTM and AI-Based Mission Coordination., , , , , , and . INFOCOM Workshops, page 1-6. IEEE, (2023)Explainable Autonomic Cybersecurity For Industrial Control Systems., , , , , and . CCWC, page 900-9006. IEEE, (2023)Who's driving you?, , and . CCNC, page 1-4. IEEE, (2018)Identification of Botnet Activity in IoT Network Traffic Using Machine Learning., , , , and . IDSTA, page 21-27. IEEE, (2020)Constructing timing-based covert channels in mobile networks by adjusting CPU frequency., , , and . HASP@ISCA, page 2:1-2:8. ACM, (2014)