Author of the publication

A temporal assessment of cyber intrusion chains using multidisciplinary frameworks and methodologies.

, , , , and . CyberSA, page 1-7. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive Neural Networks., , , , , , and . IEEE Intelligent Systems, 33 (2): 29-39 (2018)Pseudo test collections for learning web search ranking functions., , , and . SIGIR, page 1073-1082. ACM, (2011)Improvements of Image-Steganalysis Using Boosted Combinatorial Classifiers and Gaussian High Pass Filtering., , and . IIH-MSP, page 1508-1511. IEEE Computer Society, (2008)A temporal assessment of cyber intrusion chains using multidisciplinary frameworks and methodologies., , , , and . CyberSA, page 1-7. IEEE, (2017)Impossibles & Autonomous 4-Legged Soccer Team on AIBO Platform., , , , and . ARCS, page 38-44. ISRST, (2008)Using a Real-Time Cybersecurity Exercise Case Study to Understand Temporal Characteristics of Cyberattacks., , , , , , and . SBP-BRiMS, volume 10354 of Lecture Notes in Computer Science, page 127-132. Springer, (2017)Fast candidate generation for two-phase document ranking: postings list intersection with bloom filters., and . CIKM, page 2419-2422. ACM, (2012)Assessment of Group Dynamics During Cyber Crime Through Temporal Network Topology., , and . SBP-BRiMS, volume 10899 of Lecture Notes in Computer Science, page 401-407. Springer, (2018)Pattern discovery in intrusion chains and adversarial movement., , and . CyberSA, page 1-4. IEEE, (2019)3-Dimensional Ellipse-Based Trajectory Generation Model for 4-Legged Robots., , , , and . ARCS, page 9-16. ISRST, (2008)