Author of the publication

What are Information Security Ontologies Useful for?

, , , and . MTSR, volume 544 of Communications in Computer and Information Science, page 51-61. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Mail System for Secure Data Transmission in Cyber Physical Systems., , , , and . Int. J. Uncertain. Fuzziness Knowl. Based Syst., 28 (Supplement-2): 23-48 (2020)Application of the SAMA methodology to Ryuk malware., , , and . J. Comput. Virol. Hacking Tech., 19 (2): 165-198 (June 2023)A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques., , , , and . Comput. Secur., (2022)What are Information Security Ontologies Useful for?, , , and . MTSR, volume 544 of Communications in Computer and Information Science, page 51-61. Springer, (2015)The application of blockchain algorithms to the management of education certificates., , , , , and . Evol. Intell., 16 (6): 1967-1984 (December 2023)Effective Filter for Common Injection Attacks in Online Web Applications., , , , , and . IEEE Access, (2021)On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey., , , , and . IEEE Access, (2021)Building a dataset through attack pattern modeling and analysis system., , , , and . Comput. Electr. Eng., (2022)A systematic approach to analysis for assessing the security level of cyber-physical systems in the electricity sector., , , , and . Microprocess. Microsystems, (November 2021)Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey., , , , and . KSII Trans. Internet Inf. Syst., 15 (3): 1119-1139 (2021)