Author of the publication

POSTER: Evaluating Reflective Deception as a Malware Mitigation Strategy.

, , , , , and . ACM Conference on Computer and Communications Security, page 2575-2577. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects., , , , , and . DBSec, volume 113 of IFIP Conference Proceedings, page 385-388. Chapman & Hall, (1997)Issues and Techniques for Redacting PDF Files., , , , , and . J. Digital Forensic Practice, 2 (3): 113-116 (2008)Text Genre and Training Data Size in Human-like Parsing., , , , and . EMNLP/IJCNLP (1), page 5845-5851. Association for Computational Linguistics, (2019)Entropy Reduction correlates with temporal lobe activity., , , and . CMCL@EACL, page 1-10. Association for Computational Linguistics, (2017)Competitive Learning Environment for Cyber-Physical System Security Experimentation., , , , , and . ICDIS, page 211-218. IEEE, (2018)Automatic Generation of Attack Scripts from Attack Graphs., , , , and . ICDIS, page 267-274. IEEE, (2018)Temporal Lobes as Combinatory Engines for both Form and Meaning., , , and . CL4LC@COLING 2016, page 186-191. The COLING 2016 Organizing Committee, (2016)Concurrency Strategies for Attack Graph Generation., , and . ICDIS, page 174-179. IEEE, (2019)The Alice Datasets: fMRI & EEG Observations of Natural Language Comprehension., , , , and . LREC, page 120-125. European Language Resources Association, (2020)Analyzing FD Inference in Relational Databases., and . Data Knowl. Eng., 18 (2): 167-183 (1996)