Author of the publication

Discovering Graph Differential Dependencies.

, , , , , , and . ADC, volume 14386 of Lecture Notes in Computer Science, page 259-272. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Process Mining to Identify File System Metrics Impacted by Ransomware Execution., , and . MSPN, volume 12605 of Lecture Notes in Computer Science, page 57-71. Springer, (2020)Compcrypt - Lightweight ANS-based Compression and Encryption., , , , , , and . IACR Cryptol. ePrint Arch., (2021)File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems., , , , , , and . IWSEC, volume 14977 of Lecture Notes in Computer Science, page 213-233. Springer, (2024)Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems., , , , , , , , , and 5 other author(s). Comput. Secur., (2024)A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms., , , and . IEEE Access, (2023)Discovering Graph Differential Dependencies., , , , , , and . ADC, volume 14386 of Lecture Notes in Computer Science, page 259-272. Springer, (2023)Compression Optimality of Asymmetric Numeral Systems., , , , , and . CoRR, (2022)Malicious Package Detection using Metadata Information., , , , , , , , , and . WWW, page 1779-1789. ACM, (2024)Evolving techniques in cyber threat hunting: A systematic review., , , , , , , , , and 1 other author(s). J. Netw. Comput. Appl., (2024)