From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data-Driven Threat Hunting Using Sysmon., и . ICCSP, стр. 82-88. ACM, (2018)Towards Incident Response Orchestration and Automation for the Advanced Metering Infrastructure., , и . WFCS, стр. 1-8. IEEE, (2024)A Framework for Data-Driven Physical Security and Insider Threat Detection., , и . ASONAM, стр. 1108-1115. IEEE Computer Society, (2018)Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence., и . EISIC, стр. 91-98. IEEE Computer Society, (2017)Neural reputation models learned from passive DNS data., и . IEEE BigData, стр. 3662-3671. IEEE Computer Society, (2017)FormAI Dataset: A Large Collection of AI-Generated C Programs and Their Vulnerability Classifications., , , , , и . (сентября 2023)Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics., , , и . Open Identity Summit, том P-305 из LNI, стр. 185-192. Gesellschaft für Informatik e.V., (2020)TIPS: Threat Sharing Information Platform for Enhanced Security., , , , , , и . CoRR, (2024)Threat Actor Type Inference and Characterization within Cyber Threat Intelligence., , , и . CyCon, стр. 327-352. IEEE, (2021)On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence., , , , и . IEEE BigData, стр. 2104-2108. IEEE, (2021)