From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach., , , и . ISI, стр. 1-6. IEEE, (2023)Performance Modeling of Hyperledger Sawtooth Blockchain., , и . ISI, стр. 59-61. IEEE, (2019)Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach., , , , и . ISI, стр. 1-6. IEEE, (2021)Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach., , , , и . ISI, стр. 1-6. IEEE, (2020)Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach., , , , , , и . ISI, стр. 1-6. IEEE, (2020)Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach., , , и . ISI, стр. 1-6. IEEE, (2023)Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach., , , и . MIS Q., 48 (1): 137-166 (2024)The Effect of Consensus Algorithm on Ethereum Price and Volume.. AMCIS, Association for Information Systems, (2023)Benchmarking the Robustness of Phishing Email Detection Systems., , , , и . AMCIS, Association for Information Systems, (2023)Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach., , , и . ISI, стр. 1-6. IEEE, (2021)