From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting Unknown Insider Threat Scenarios., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 277-288. IEEE Computer Society, (2014)Detecting and Annotating Narratives in Social Media: A Vision Paper., , , и . ICWSM Workshops, (2020)Causal Discovery of Cyber Attack Phases., , и . ICMLA, стр. 1348-1352. IEEE, (2019)Collective Relational Data Integration with Diverse and Noisy Evidence.. University of Maryland, College Park, MD, USA, (2019)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/25568).Explaining and Aggregating Anomalies to Detect Insider Threats., , , и . HICSS, стр. 2739-2748. IEEE Computer Society, (2016)SPLAIN: Augmenting Cybersecurity Warnings with Reasons and Data., , , , , , и . CoRR, (2023)A Collective, Probabilistic Approach to Schema Mapping Using Diverse Noisy Evidence., , , и . IEEE Trans. Knowl. Data Eng., 31 (8): 1426-1439 (2019)Use of Domain Knowledge to Detect Insider Threats in Computer Activities., , , , и . IEEE Symposium on Security and Privacy Workshops, стр. 60-67. IEEE Computer Society, (2013)