Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities., , , , , , , and . IEEE Access, (2024)Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities., , , , , , , and . CoRR, (2023)LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge., , , , , , and . CoRR, (2024)AI_Adaptive_POW: An AI assisted Proof Of Work (POW) framework for DDoS defense., , , and . Softw. Impacts, (2022)URA*: Uncertainty-aware Path Planning using Image-based Aerial-to-Ground Traversability Estimation for Off-road Environments., , , , , , and . CoRR, (2023)Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs., , , and . IEEE BigData, page 3316-3323. IEEE, (2021)Use of Graph Neural Networks in Aiding Defensive Cyber Operations., , , , and . CoRR, (2024)Survey of Malware Analysis through Control Flow Graph using Machine Learning., , and . CoRR, (2023)A Policy Driven AI-Assisted PoW Framework., , , and . DSN (Supplements), page 37-38. IEEE, (2022)MedInsight: A Multi-Source Context Augmentation Framework for Generating Patient-Centric Medical Responses using Large Language Models., , , , , and . CoRR, (2024)