Author of the publication

A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.

, , , , , , , and . IRI, page 1-10. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloud Governance.. CLOUD, page 86-90. IEEE, (2020)Keynote I Cyber Security Meets Big Knowledge: Towards a Secure HACE Theorem.. ICKG, page 1-6. IEEE, (2020)LPC: A Logits and Parameter Calibration Framework for Continual Learning., , , , and . EMNLP (Findings), page 7142-7155. Association for Computational Linguistics, (2022)R2D: Extracting Relational Structure from RDF Stores., , , , and . Web Intelligence, page 361-366. IEEE Computer Society, (2009)Automated Threat Report Classification over Multi-Source Data., , , , and . CIC, page 236-245. IEEE Computer Society, (2018)Data Mining for Security Applications., , , and . EUC (2), page 585-589. IEEE Computer Society, (2008)978-0-7695-3492-3.A language for provenance access control., , , and . CODASPY, page 133-144. ACM, (2011)Incentive and Trust Issues in Assured Information Sharing., , and . CollaborateCom, volume 10 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 113-125. Springer / ICST, (2008)Design and Implementation of a Semantic Web-Based Inference Controller: A Summary., , , and . IRI, page 451-456. IEEE Computer Society, (2015)Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students., , , , , , and . IWSPA@CODASPY, page 55-57. ACM, (2015)