Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps., , , and . CoRR, (2019)IP2User - Identifying the Username of an IP Address in Network-Related Events., , , , , , , and . BigData Congress, page 435-436. IEEE Computer Society, (2013)Improving malware detection by applying multi-inducer ensemble., , , and . Comput. Stat. Data Anal., 53 (4): 1483-1494 (2009)Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities., , , , , , , and . CoRR, (2020)M-Score: A Misuseability Weight Measure., , , and . IEEE Trans. Dependable Secur. Comput., 9 (3): 414-428 (2012)An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions., , , , , and . CoRR, (2020)Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes., , , and . CoRR, (2020)Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs., , , and . IEEE Trans. Inf. Forensics Secur., 14 (6): 1638-1653 (2019)Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples., , , , and . CoRR, (2020)Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems., , , , , , , and . CoRR, (2020)