From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation., и . ICC, стр. 1-7. IEEE, (2018)A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption., и . ISCISC, стр. 38-45. IEEE, (2016)Crowdfunding Project Success for Game Developers: Evidence from Kickstarter and Steam., , и . HICSS, стр. 1-10. ScholarSpace, (2022)Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns., , , , , и . Digit. Investig., (2019)Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet Measurements., , и . DSN, стр. 497-506. IEEE, (2021)Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution., , , , , , и . NOMS, стр. 1-6. IEEE, (2023)Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations., , , , , , и . WiMob, стр. 206-211. IEEE, (2023)Exploring Internet-Scale Data-Driven Intelligence: Empirical Analysis of the Russo-Ukrainian Conflict., , , и . ICC Workshops, стр. 896-901. IEEE, (2024)Federated Learning Approach for Distributed Ransomware Analysis., , , , , , и . ACNS Workshops, том 13907 из Lecture Notes in Computer Science, стр. 621-641. Springer, (2023)A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale., , и . ARES, стр. 32:1-32:11. ACM, (2022)