Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring Abuse in Web Push Advertising., , , , , and . CoRR, (2020)Active Deception using Factored Interactive POMDPs to Recognize Cyber Attacker's Intent., , and . CoRR, (2020)ChatterHub: Privacy Invasion via Smart Home Hub., , , , , , and . SMARTCOMP, page 181-188. IEEE, (2021)Spatio-Temporal Coverage Enhancement in Drive-By Sensing Through Utility-Aware Mobile Agent Selection., , , , and . ICIOT, volume 12405 of Lecture Notes in Computer Science, page 108-124. Springer, (2020)GrAALF: Supporting Graphical Analysis of Audit Logs for Forensics., , , , and . CoRR, (2019)Privacy invasion via smart-home hub in personal area networks., , , , , , and . Pervasive Mob. Comput., (2022)GrAALF: Supporting graphical analysis of audit logs for forensics., , , , and . Softw. Impacts, (2021)Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races., , , and . DIMVA, volume 12756 of Lecture Notes in Computer Science, page 215-236. Springer, (2021)A Novel AI-based Methodology for Identifying Cyber Attacks in Honey Pots., , , , and . AAAI, page 15224-15231. AAAI Press, (2021)Cyber Attack Intent Recognition and Active Deception using Factored Interactive POMDPs., , and . AAMAS, page 1200-1208. ACM, (2021)