Author of the publication

A dictionary-based method for detecting machine-generated domains.

, , and . Inf. Secur. J. A Glob. Perspect., 30 (4): 205-218 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The impact of countermeasure propagation on the prevalence of computer viruses., and . IEEE Trans. Syst. Man Cybern. Part B, 34 (2): 823-833 (2004)A comparison of classifiers and features for authorship authentication of social networking messages., , , , and . Concurr. Comput. Pract. Exp., (2017)Understanding Nigerian e-mail scams: A computational content analysis approach., , , and . Inf. Secur. J. A Glob. Perspect., 30 (2): 88-99 (2021)A Hands-on Introduction to GIS with a Simple Application to Wi-Fi Security., and . AMCIS, page 75. Association for Information Systems, (2009)An Investigation of Decision-Making and the Tradeoffs involving Computer Security Risk., and . AMCIS, page 610. Association for Information Systems, (2009)Electronic Health Record Error Prevention Approach Using Ontology in Big Data., , , and . HPCC/CSS/ICESS, page 752-757. IEEE, (2015)Individual Risk Perception and Choice using Cryptocurrency for Transactions., and . ICIS, Association for Information Systems, (2019)Model alignment of anthrax attack simulations., , , , and . Decis. Support Syst., 41 (3): 654-668 (2006)Characterization of defense mechanisms against distributed denial of service attacks., , and . Comput. Secur., 23 (8): 665-678 (2004)An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building., , , and . NCS, volume 310 of Lecture Notes in Networks and Systems, page 3-12. Springer, (2021)