Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognitive Techniques for Early Detection of Cybersecurity Events., , , , , and . CoRR, (2018)Early Detection of Cybersecurity Threats Using Collaborative Cognition., , , , , and . CIC, page 354-363. IEEE Computer Society, (2018)Semantically Rich, Context Aware Access Control for Openstack., , , and . CIC, page 460-465. IEEE Computer Society, (2018)ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems., , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1673-1686 (2022)Using semantic technologies to mine vehicular context for security., , and . Sarnoff Symposium, page 124-129. IEEE, (2016)Using Data Analytics to Detect Anomalous States in Vehicles., , and . CoRR, (2015)Context-Sensitive Policy Based Security in Internet of Things., , , , , and . SMARTCOMP, page 1-6. IEEE Computer Society, (2016)DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection., , , and . ISI, page 64-69. IEEE, (2018)Anomaly Detection Models for Smart Home Security., , , , and . BigDataSecurity/HPSC/IDS, page 19-24. IEEE, (2019)A Policy Based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic., , and . BigDataSecurity/HPSC/IDS, page 47-52. IEEE, (2019)