From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation., , , , и . CoRR, (2023)RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports., , , , и . CoRR, (2023)An Overview and Ontology of Privacy to Preserve Privacy in Ultra-Wideband Networks., , , и . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, стр. 2317-2324. IEEE, (2022)RansomAI: AI-Powered Ransomware for Stealthy Encryption., , , , , , и . GLOBECOM, стр. 2578-2583. IEEE, (2023)Early Detection of Cryptojacker Malicious Behaviors on IoT Crowdsensing Devices., , , , , , и . NOMS, стр. 1-8. IEEE, (2023)MalwSpecSys: A Dataset Containing Syscalls of an IoT Spectrum Sensor Affected by Heterogeneous Malware., , , , , , и . (мая 2022)CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation., , , , , , , и . CoRR, (2023)Behavioral fingerprinting to detect ransomware in resource-constrained devices., , , , , , , и . Comput. Secur., (декабря 2023)RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT., , , , , , и . CoRR, (2022)QuantTM: Business-Centric Threat Quantification for Risk Management and Cyber Resilience., , , и . CoRR, (2024)