Author of the publication

STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk.

, , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1074-1087 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hercules Against Data Series Similarity Search., , , , and . Proc. VLDB Endow., 15 (10): 2005-2018 (2022)Optimal Combination of Imitation and Reinforcement Learning for Self-driving Cars., and . Rev. d'Intelligence Artif., 33 (4): 265-273 (2019)STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1074-1087 (March 2023)Toward Reliable Mobile CrowdSensing Data Collection: Image Splicing Localization Overview., , , , , and . IWCMC, page 81-86. IEEE, (2023)An Overview of Funded Research Projects in The MENA Region on Intelligent Transportation Systems., , , , , , , , and . IWCMC, page 313-320. IEEE, (2023)Beyond Locks and Keys: Structural Equation Modeling Based Framework to Explore Security Breaches Through the Lens of Crime Theories., , , and . NETYS, volume 14067 of Lecture Notes in Computer Science, page 96-101. Springer, (2023)Deep reinforcement learning with external control: self-driving car application., and . SCA, page 58:1-58:7. ACM, (2019)Conflict spectrum: An empirical study of geopolitical cyber threats from a social network perspective., , , , , and . SNAMS, page 1-7. IEEE, (2021)Enhancing Cyber Threat Identification in Open-Source Intelligence Feeds Through an Improved Semi-Supervised Generative Adversarial Learning Approach With Contrastive Learning., , , and . IEEE Access, (2023)End-to-end LDA-based automatic weak signal detection in web news., , and . Knowl. Based Syst., (2021)