Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage., , , and . IEEE Trans. Knowl. Data Eng., 26 (3): 682-697 (2014)Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots., , , , , , and . CODASPY, page 85-96. ACM, (2019)Helix: DGA Domain Embeddings for Tracking and Exploring Botnets., , , , and . CIKM, page 2741-2748. ACM, (2020)Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions., , , , and . Sensors, 23 (8): 4018 (2023)Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1936-1954 (2022)Mobile malware detection through analysis of deviations in application network behavior., , , , , and . Comput. Secur., (2014)Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal., , , , and . Sensors, 20 (21): 6157 (2020)Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers., , , , , and . CoRR, (2020)Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain., , , and . ACM Comput. Surv., 54 (5): 108:1-108:36 (2022)SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research., , , , and . AISec@CCS, page 1-12. ACM, (2016)