Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Husari, Ghaith
add a person with the name Husari, Ghaith
 

Other publications of authors with the same name

ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration., , and . J. Netw. Syst. Manag., 25 (4): 759-783 (2017)Feed-Forward Intrusion Detection and Classification on a Smart Grid Network., , and . CCWC, page 99-105. IEEE, (2022)SnapCatch: Automatic Detection of Covert Timing Channels Using Image Processing and Machine Learning., , , and . IEEE Access, (2021)Agile Approaches for Cybersecurity Systems, IoT and Intelligent Transportation., , , , , , and . IEEE Access, (2022)Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence., , , and . ISI, page 1-6. IEEE, (2018)A Data-Driven Password Strength Meter for Cybersecurity Assessment and Enhancement., , and . HPCC/DSS/SmartCity/DependSys, page 1980-1987. IEEE, (2021)TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources., , , , and . ACSAC, page 103-115. ACM, (2017)Machine learning predictive analytics for player movement prediction in NBA: applications, opportunities, and challenges., , , and . ACM Southeast Conference, page 2-8. ACM, (2021)Optimizing the RoI of cyber risk mitigation., , and . CNSM, page 223-227. IEEE, (2016)Learning APT chains from cyber threat intelligence., , , and . HotSoS, page 19:1-19:2. ACM, (2019)