Author of the publication

Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.

, , , , , and . CCS, page 755-766. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things., , , , and . Future Gener. Comput. Syst., (2014)State of the Art: Secure Mobile Payment., , and . IEEE Access, (2020)Two Stages Empty Containers Repositioning of Asia-Europe Shipping Routes Under Revenue Maximization., , and . IFIP TC12 ICIS, volume 510 of IFIP Advances in Information and Communication Technology, page 379-389. Springer, (2017)Comparing Apples with Oranges? The Perceived Differences between Agile and Lean Software Development Processes., and . ICIS, Association for Information Systems, (2011)Understanding agility in software development through a complex adaptive systems perspective., and . ECIS, page 2182-2193. (2009)An improved feature fusion algorithm for image retrieval., , and . CISP-BMEI, page 384-389. IEEE, (2016)A Framework for Systematic Analysis of Open Access Journals and its Application in Software Engineering and Information Systems., , and . CoRR, (2013)A Contourlet-Domain Image Signature for Content Authentication., , and . IIH-MSP, page 555-558. IEEE, (2013)基于可穿戴设备的心电图自适应分类算法研究 (Study on Patient-adaptive Algorithm for ECG Classification Based on Wearable Devices)., , and . 计算机科学, 46 (12): 292-297 (2019)An overlapping window decorrelating multiuser detector for DS-CDMA radio channels., , and . IEEE Trans. Commun., 49 (8): 1488-1495 (2001)