Author of the publication

A Deep Neural Network Approach to Tracing Paths in Cybersecurity Investigations.

, , , and . ICDM (Workshops), page 472-479. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Iterative Method for Distributed Database Design., , and . VLDB, page 389-400. Morgan Kaufmann, (1991)Guest editors' remarks., , and . Decis. Support Syst., 17 (1): 1-2 (1996)A Deep Neural Network Approach to Tracing Paths in Cybersecurity Investigations., , , and . ICDM (Workshops), page 472-479. IEEE, (2020)Evaluation of Optical Disk Systems for Very Large Database Applications.. SIGMETRICS, page 166-172. ACM, (1985)Local query translation and optimization in a distributed system., , and . AFIPS National Computer Conference, page 229-239. AFIPS Press, (1983)Sharing Design Knowledge Through Codification in Interdisciplinary DSR Collaborations., , , and . HICSS, page 5136-5145. ScholarSpace, (2023)A Fitness-Utility Model for Design Science Research., and . DESRIST, volume 6629 of Lecture Notes in Computer Science, page 237-252. Springer, (2011)The Information System Research Cycle, and . IEEE Computer, 36 (11): 111--113 (2003)Community Health Assessments: A Data Warehousing Approach., , and . ECIS, page 1276-1283. (2000)Distributed Data Allocation Strategies., and . Advances in Computers, (1988)