Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SCADA honeypots: An in-depth analysis of Conpot., , and . ISI, page 196-198. IEEE, (2016)Anonymous port scanning: Performing network reconnaissance through Tor., , and . ISI, page 217. IEEE, (2016)Identifying top listers in Alphabay using Latent Dirichlet Allocation., , , , and . ISI, page 219. IEEE, (2016)Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach., , , , , , and . ISI, page 1-6. IEEE, (2020)Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions., , , and . ISI, page 148-153. IEEE, (2018)Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach., , , , , and . IEEE Intell. Syst., 33 (2): 63-73 (2018)Introduction to the Minitrack on Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI., , , and . HICSS, page 536-537. ScholarSpace, (2024)Assessing medical device vulnerabilities on the Internet of Things., , , , , and . ISI, page 176-178. IEEE, (2017)Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study., , , and . ISI, page 94-99. IEEE, (2018)Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence., , , and . ISI, page 13-18. IEEE, (2017)