Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OSCIDS: An Ontology based SCADA Intrusion Detection Framework., , and . SECRYPT, page 327-335. SciTePress, (2016)Detecting packed executables using steganalysis., , , and . EUVIP, page 1-5. IEEE, (2014)PageRank in Malware Categorization., , , and . CoRR, (2016)PageRank in malware categorization., , , and . RACS, page 291-295. ACM, (2015)SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection., , , and . IEEE Trans. Inf. Forensics Secur., 8 (3): 500-509 (2013)A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems., , , , and . ISGT, page 1-5. IEEE, (2020)N-opcode analysis for android malware classification and categorization., , , and . Cyber Security And Protection Of Digital Services, page 1-7. IEEE, (2016)Policy-Based Profiles for Network Intrusion Response Systems., , and . CSR, page 279-286. IEEE, (2022)Cybersecurity Engineering: Bridging the Security Gaps in Advanced Automotive Systems and ISO/SAE 21434., , , , , , and . VTC2023-Spring, page 1-6. IEEE, (2023)Intelligent Sensor Information System For Public Transport - To Safely Go..., , , , , , , , , and . AVSS, page 533-538. IEEE Computer Society, (2010)