Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic., , , , , , and . DSN, page 76-87. IEEE, (2020)Scalable malware classification with multifaceted content features and threat intelligence., , , , , and . IBM J. Res. Dev., 60 (4): 6 (2016)Traffic Anomaly Detection and Diagnosis on the Network Flow Level.. EPFL, Switzerland, (2011)IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics., , , , , and . ICDE, page 1316-1327. IEEE Computer Society, (2015)MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation., , , , , and . EURASIP J. Information Security, (2014)Dressed up: Baiting Attackers through Endpoint Service Projection., , , and . SDN-NFV@CODASPY, page 23-28. ACM, (2018)Stream computing for large-scale, multi-channel cyber threat analytics., , , , , , , , and . IRI, page 8-15. IEEE Computer Society, (2014)Passive security intelligence to analyze the security risks of mobile/BYOD activities., , , , , , , , , and . IBM J. Res. Dev., 60 (4): 9 (2016)POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality., , , and . CCS, page 2523-2525. ACM, (2017)