Author of the publication

Enabling forensics by proposing heuristics to identify mandatory log events.

, , and . HotSoS, page 6:1-6:11. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key criteria for selecting a secure cloud wireless net work., and . Netw. Secur., 2016 (1): 17-20 (2016)Finding Large H-Colorable Subgraphs in Hereditary Graph Classes., , , , and . ESA, volume 173 of LIPIcs, page 35:1-35:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Teaching Software Engineering Skills in CS1.5: Incorporating Real-world Practices and Tools (Abstract Only)., and . SIGCSE, page 696-697. ACM, (2016)Automating Software Engineering Best Practices Using an Open Source Continuous Integration Framework (Abstract Only)., , and . SIGCSE, page 677. ACM, (2015)Measuring the forensic-ability of audit logs for nonrepudiation.. ICSE, page 1419-1422. IEEE Computer Society, (2013)Finding Large H-Colorable Subgraphs in Hereditary Graph Classes., , , , and . SIAM J. Discret. Math., 35 (4): 2357-2386 (2021)Determining Viability of Deep Learning on Cybersecurity Log Analytics., , and . IEEE BigData, page 4806-4811. IEEE, (2018)Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings., , , , , , , , , and 1 other author(s). HotSoS, page 38-51. ACM, (2016)Combining Theory and Practice in Data Structures & Algorithms Course Projects: An Experience Report.. SIGCSE, page 959-965. ACM, (2021)Finding large $H$-colorable subgraphs in hereditary graph classes., , , and . CoRR, (2020)