Author of the publication

Modeling and Predicting Cyber Hacking Breaches.

, , , and . IEEE Trans. Inf. Forensics Secur., 13 (11): 2856-2871 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites., , , , and . ISI, page 1-6. IEEE, (2020)Modeling and Predicting Cyber Hacking Breaches., , , and . IEEE Trans. Inf. Forensics Secur., 13 (11): 2856-2871 (2018)A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs., , , and . MILCOM, page 70-75. IEEE, (2018)Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study., , , and . MILCOM, page 1-6. IEEE, (2019)Characterizing the Effectiveness of Network-Based Intrusion Detection Systems., , , and . MILCOM, page 76-81. IEEE, (2018)Reducing Intrusion Alert Trees to Aid Visualization., , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 140-154. Springer, (2022)Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites., , , , and . CoRR, (2021)Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses., , , , and . CoRR, (2021)Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting., , , , , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 60-81. Springer, (2023)Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses., , , , and . ISI, page 1-6. IEEE, (2020)