Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On a Generic Security Game Model., and . CoRR, (2018)Runtime monitors for tautology based SQL injection attacks., and . CyberSec, page 253-258. IEEE, (2012)Comparing Agent Software Development Methodologies using the CMMI Engineering Process Model., and . AMCIS, page 510. Association for Information Systems, (2005)Combinational logic synthesis from an HDL description.. DAC, page 550-555. ACM/IEEE, (1980)IoMT-SAF: Internet of Medical Things Security Assessment Framework., , , and . Internet Things, (2019)CoRuM: Collaborative Runtime Monitor Framework for Application Security., and . UCC Companion, page 201-206. IEEE, (2018)Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection., , , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 4821-4833 (December 2022)A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems., and . Comput. Secur., 9 (5): 431-446 (1990)Energy Efficient Double Critic Deep Deterministic Policy Gradient Framework for Fog Computing., and . AIIoT, page 521-527. IEEE, (2022)Requirements Elicitation and Stakeholder Communications for Explainable Machine Learning Systems: State of the Art., , and . ICIT, page 561-566. IEEE, (2023)