Author of the publication

Decoy Document Deployment for Effective Masquerade Attack Detection.

, and . DIMVA, volume 6739 of Lecture Notes in Computer Science, page 35-54. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems., , , , and . CNS, page 1-9. IEEE, (2018)A Validation Approach for Ontology-Based Real-time DBMS., , , , and . Int. J. Comput. Intell. Syst., 12 (1): 311-317 (2018)Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System., , , , and . CCTA, page 1692-1697. IEEE, (2018)Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-supervised Neural Networks., , , , and . SecureComm (1), volume 335 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 481-502. Springer, (2020)Active authentication using file system decoys and user behavior modeling: results of a large scale study., , , , and . Comput. Secur., (2019)Towards Effective Masquerade Attack Detection.. Columbia University, USA, (2012)A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection., and . Secur. Commun. Networks, 5 (8): 863-872 (2012)Monitoring Technologies for Mitigating Insider Threats., , , and . Insider Threats in Cyber Security, volume 49 of Advances in Information Security, Springer, (2010)A Survey of Insider Attack Detection Research., , and . Insider Attack and Cyber Security, volume 39 of Advances in Information Security, Springer, (2008)Cloud Computing., , and . J. Internet Serv. Inf. Secur., 1 (1): 1-3 (2011)