Author of the publication

A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts.

, , , , , and . SpaCCS Workshops, volume 10067 of Lecture Notes in Computer Science, page 342-357. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Artificial Intelligence and Security of Industrial Control Systems., , , and . Handbook of Big Data Privacy, Springer, (2020)Machine Learning Aided Static Malware Analysis: A Survey and Tutorial., , , and . CoRR, (2018)A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks., , , , and . IEEE Trans. Emerg. Top. Comput., 7 (2): 314-323 (2019)A Hybrid RSA Algorithm in Support of IoT Greenhouse Applications., , , and . ICII, page 233-240. IEEE, (2019)An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System., , , and . IEEE Access, (2020)Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence., , , , and . IEEE Trans. Emerg. Top. Comput., 8 (2): 341-351 (2020)A Mitigation Approach to the Privacy and Malware Threats of Social Network Services., and . ICDIPC (2), volume 189 of Communications in Computer and Information Science, page 448-459. Springer, (2011)Towards data centric mobile security., , and . IAS, page 62-67. IEEE, (2011)Ensemble sparse representation-based cyber threat hunting for security of smart cities., , , , and . Comput. Electr. Eng., (2020)An ensemble deep learning model for cyber threat hunting in industrial internet of things., , , , and . Digit. Commun. Networks, 9 (1): 101-110 (February 2023)