Author of the publication

Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence.

, , , and . ISI, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive Code Annotation for Security Vulnerability Detection., , , and . SIW@CCS, page 17-22. ACM, (2014)What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool., , , , and . WSIW@SOUPS, USENIX Association, (2016)Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks., , and . IRI, page 73-78. IEEE Systems, Man, and Cybernetics Society, (2007)Using a Practice Oriented Approach to Teach Web Security Course., , , , and . FECS, page 405-409. CSREA Press, (2009)Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code., , and . SACMAT, page 73-80. ACM, (2016)Interactive support for secure programming education., , and . SIGCSE, page 687-692. ACM, (2013)How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool., , , , and . IEEE Trans. Software Eng., 45 (9): 877-897 (2019)Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing., , and . QRS, page 364-373. IEEE, (2017)Using Unit Testing to Detect Sanitization Flaws., , and . CoRR, (2018)FAIME: An Object-Oriented Methodology for Application Plug-and-Play., , , , , , and . JOOP, 11 (5): 20-26, 34 (1998)