Author of the publication

Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required.

, , , , , and . INCoS, page 652-655. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fixed codebook design for ACELP coder using algebraic trellis vector codes., , , and . ICSPCS, page 1-3. IEEE, (2011)A design of a 5.6 GHz frequency synthesizer with switched bias LIT VCO and low noise on-chip LDO regulator for 5G applications., , , , , , , , and . I. J. Circuit Theory and Applications, 47 (11): 1856-1868 (2019)MobilePill: Accurate Pill Image Classification via Deep Learning on Mobile., , , and . ICTC, page 1362-1367. IEEE, (2019)APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE., , and . Appl. Soft Comput., (2020)Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems., , , , and . IEEE Access, (2021)Malicious URL protection based on attackers' habitual behavioral analysis., , and . Comput. Secur., (2018)Smart seed selection-based effective black box fuzzing for IIoT protocol., , , and . J. Supercomput., 76 (12): 10140-10154 (2020)Practical Codebook Design for Limited Feedback Spatial Multiplexing., , and . ICC, page 3982-3987. IEEE, (2008)Prof-gen: Practical Study on System Call Whitelist Generation for Container Attack Surface Reduction., , and . CLOUD, page 278-287. IEEE, (2021)Collaborative Method for Incremental Learning on Classification and Generation., , , , and . CoRR, (2020)