From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identifying top listers in Alphabay using Latent Dirichlet Allocation., , , , и . ISI, стр. 219. IEEE, (2016)SCADA honeypots: An in-depth analysis of Conpot., , и . ISI, стр. 196-198. IEEE, (2016)Anonymous port scanning: Performing network reconnaissance through Tor., , и . ISI, стр. 217. IEEE, (2016)Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach., , , , , , и . ISI, стр. 1-6. IEEE, (2020)Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions., , , и . ISI, стр. 148-153. IEEE, (2018)Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach., , , , , и . IEEE Intell. Syst., 33 (2): 63-73 (2018)Introduction to the Minitrack on Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI., , , и . HICSS, стр. 536-537. ScholarSpace, (2024)Assessing medical device vulnerabilities on the Internet of Things., , , , , и . ISI, стр. 176-178. IEEE, (2017)Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study., , , и . ISI, стр. 94-99. IEEE, (2018)Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence., , , и . ISI, стр. 13-18. IEEE, (2017)