Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Concept Classification of Text from Electronic Meetings, , , , and . Commun. ACM, 37 (10): 56--73 (1994)Identifying top listers in Alphabay using Latent Dirichlet Allocation., , , , and . ISI, page 219. IEEE, (2016)SCADA honeypots: An in-depth analysis of Conpot., , and . ISI, page 196-198. IEEE, (2016)Anonymous port scanning: Performing network reconnaissance through Tor., , and . ISI, page 217. IEEE, (2016)Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF)., , and . ACM Trans. Priv. Secur., 23 (4): 21:1-21:33 (2020)Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)., , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2149-2150 (2022)Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: An Affordance Perspective., , , and . ACM Trans. Manag. Inf. Syst., 13 (1): 10:1-10:24 (2022)A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems., , and . ACM Trans. Manag. Inf. Syst., 12 (1): 1:1-1:18 (2021)Intelligence and security informatics for homeland security: information, communication, and transportation., , and . IEEE Trans. Intell. Transp. Syst., 5 (4): 329-341 (2004)Senior Scholars' Forum., , , , , and . ICIS, Association for Information Systems, (2011)