Author of the publication

A network intrusion detection system (NIDS) based on information centrality to identify systemic cyber attacks in large systems.

. Rensselaer Polytechnic Institute, USA, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FoodKG Enabled Q&A Application., , , , , , , and . ISWC (Satellites), volume 2456 of CEUR Workshop Proceedings, page 273-276. CEUR-WS.org, (2019)Ontology-driven Knowledge Graph for Android Malware., , , and . CoRR, (2021)Bias Impact Analysis of AI in Consumer Mobile Health Technologies: Legal, Technical, and Policy., , and . CoRR, (2022)Applying Learning and Semantics for Personalized Food Recommendations., , , , , , , , , and 4 other author(s). ISWC (Demos/Industry), volume 2721 of CEUR Workshop Proceedings, page 305-310. CEUR-WS.org, (2020)SECURE: Benchmarking Generative Large Language Models for Cybersecurity Advisory., , , , , , , , and . CoRR, (2024)Secure scheme during vertical handoff in integrated heterogeneous wireless systems., , and . WTS, page 1-5. IEEE, (2011)Managing crises, one text at a time., and . ACM Crossroads, 23 (3): 36-37 (2017)Exploring Information Centrality for Intrusion Detection in Large Networks.. CoRR, (2019)An Ontology-driven Knowledge Graph for Android Malware., , , and . CCS, page 2435-2437. ACM, (2021)SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability., , , , , , and . ARES, page 35:1-35:12. ACM, (2023)