Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Automated Framework for Real-time Phishing URL Detection., , , and . CCWC, page 335-341. IEEE, (2020)Analysis of Attacker Behavior in Compromised Hosts During Command and Control., and . ICC, page 1-7. IEEE, (2021)Automated Structured Threat Information Expression (STIX) Document Generation with Privacy Preservation., , , , and . UEMCON, page 847-853. IEEE, (2018)A System Architecture of Cybersecurity Information Exchange with Privacy (CYBEX-P)., , , and . CCWC, page 493-498. IEEE, (2019)Modeling and analyzing attacker behavior in IoT botnet using temporal convolution network (TCN)., and . Comput. Secur., (2022)Sharing is Caring: Optimized Threat Visualization for a Cybersecurity Data Sharing Platform., , , , , , , and . NCA, page 1-8. IEEE, (2021)Cybersecurity Information Exchange with Privacy (CYBEX-P) and TAHOE - A Cyberthreat Language.. University of Nevada, Reno, USA, (2022)base-search.net (ftunivnevadair:oai:scholarworks.unr.edu:11714/8041).Cybersecurity Information Exchange with Privacy (CYBEX-P) and TAHOE - A Cyberthreat Language., , , , , , , , , and . CoRR, (2021)Content Based Unsupervised Video Summarization Using Birds Foraging Search., , and . ICCCNT, page 1-7. IEEE, (2020)