Author of the publication

Insider threat discovery using automatic detection of mission critical data based on content.

, and . IAS, page 56-61. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elevator Dispatching Using Heuristic Search., , and . Intell. Autom. Soft Comput., 16 (1): 77-87 (2010)Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders., and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 208-221. Springer, (2009)Design solutions for the Bulldozer 32nm SOI 2-core processor module in an 8-core CPU., , , , , , , , , and 4 other author(s). ISSCC, page 78-80. IEEE, (2011)Steamroller Module and Adaptive Clocking System in 28 nm CMOS., , , , , , , , , and 5 other author(s). IEEE J. Solid State Circuits, 50 (1): 24-34 (2015)Insider threat discovery using automatic detection of mission critical data based on content., and . IAS, page 56-61. IEEE, (2010)Unsupervised One-Class Learning for Anomaly Detection on Home IoT Network Devices., and . CyberSA, page 1-8. IEEE, (2021)"Zen 4": The AMD 5nm 5.7GHz x86-64 Microprocessor Core., , , , , , , , , and 10 other author(s). ISSCC, page 38-39. IEEE, (2023)OGMA: Visualisation for Software Container Security Analysis and Automated Remediation., , and . CSR, page 76-81. IEEE, (2022)4.8 A 28nm x86 APU optimized for power and area efficiency., , , , , , , , , and 2 other author(s). ISSCC, page 1-3. IEEE, (2015)Creating Personally Identifiable Honeytokens.. SCSS (1), page 227-232. Springer, (2008)