Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber threat hunting using unsupervised federated learning and adversary emulation., and . CSR, page 315-320. IEEE, (2023)Catchem: A Browser Plugin for the Panama Papers Using Approximate String Matching., , , and . EISIC, page 139-142. IEEE Computer Society, (2017)On the Use of URLs and Hashtags in Age Prediction of Twitter Users., , , , and . IRI, page 62-69. IEEE, (2018)Covert Online Ethnography and Machine Learning for Detecting Individuals at Risk of Being Drawn into Online Sex Work., , , , and . ASONAM, page 1096-1099. IEEE Computer Society, (2018)Privacy preserving sentiment analysis on multiple edge data streams with Apache NiFi., , , , , , and . EISIC, page 130-133. IEEE, (2019)MaTED: Metadata-Assisted Twitter Event Detection System., , , and . IPMU (1), volume 1237 of Communications in Computer and Information Science, page 402-414. Springer, (2020)Hack the Room: Exploring the potential of an augmented reality game for teaching cyber security., , , , , and . AHs, page 349-353. ACM, (2023)Safeguarding cyberspace: Enhancing malicious website detection with PSO optimized XGBoost and firefly-based feature selection., and . Comput. Secur., (2024)CYGENT: A cybersecurity conversational agent with log summarization powered by GPT-3., , and . CoRR, (2024)GPT-2C: a parser for honeypot logs using large pre-trained language models., , , , , and . ASONAM, page 649-653. ACM, (2021)